CN107133664A - Electronic tag and processing system and method for ensuring electronic tag - Google Patents

Electronic tag and processing system and method for ensuring electronic tag Download PDF

Info

Publication number
CN107133664A
CN107133664A CN201710437312.2A CN201710437312A CN107133664A CN 107133664 A CN107133664 A CN 107133664A CN 201710437312 A CN201710437312 A CN 201710437312A CN 107133664 A CN107133664 A CN 107133664A
Authority
CN
China
Prior art keywords
information
information table
password
project
electronic tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710437312.2A
Other languages
Chinese (zh)
Other versions
CN107133664B (en
Inventor
周东海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TAIWAN DEVELOPMENT & CONSTRUCTION Co
Original Assignee
TAIWAN DEVELOPMENT & CONSTRUCTION Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from TW102105419A external-priority patent/TWI502525B/en
Application filed by TAIWAN DEVELOPMENT & CONSTRUCTION Co filed Critical TAIWAN DEVELOPMENT & CONSTRUCTION Co
Publication of CN107133664A publication Critical patent/CN107133664A/en
Application granted granted Critical
Publication of CN107133664B publication Critical patent/CN107133664B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10366Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07758Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Abstract

The present disclosure relates to an electronic tag and a processing system and method for securing the electronic tag. A method for an RFID-tagged item processing system to authenticate an electronic tag, the electronic tag including a tag identifier and a tag memory, the method comprising: and establishing an item information table containing a first information table and a second information table on the electronic tag, wherein the second information table contains second authentication information, a short message receiving number and second other information. And selecting and checking the electronic tags. The read first information table includes a first encryption key and an item expiration date. The number of blocks of the first information table and the item deadline are checked. Reading the tag identifier includes a tag serial number. The first encryption key is decrypted to obtain the second sub-information. And checking the second sub-information to authenticate the authenticity of the electronic label. The second information table is read. The second information table with the original arrangement is obtained through an inverse adjustment operation. Authenticating the second authentication information to use the second other information and transmitting the short message to the received short message number.

Description

Electronic tag and processing system and method for ensuring electronic tag
The application is entitled " method and its device and system that are used in electronic tag " submitted on December 26th, 2013 Chinese patent application NO.201310728850.9 divisional application.
Technical field
The application be on it is a kind of for RFID tag Item Processing System be used in electronic tag method and using should The device and system of method, especially with regard to a kind of in the item for having coding parameter in electronic tag according to the foundation of plural authentication phase Mesh information table, using decryption encryption key and authentication password, adjusting parameter sequentially, or more combine with the electronic tag of certification one For RFID tag Item Processing System plural authentication method and using this method device and system.
Background technology
Radio frequency identification (Radio Frequency Identification, RFID) system generally comprises RFID electronics Label, RFID reader and the component such as computer (Computer) or controller (Controller).The electronic tag is included One insert (inlay), the insert includes an integrated circuit (IC) and an antenna, and such as integrated circuit function meets ISO The communication interface such as 18000-6C/EPC C1GEN2, ISO 18000-3M3 or ISO 18000-3 provides that the antenna is via special Encapsulation technology is placed in the electronic tag, the reader can according to it is defined instruction with the electronic tag carry out communication session and Access data.The electronic tag includes a label identifier, is made up of manufacturer's numbering and unique label sequence number, And include the memory headroom of a storage data.The processing routine of the computer will be first set between the electronic tag and the reader Communication modes, it include communication channel, conference number (Session Number), pulsewidth, link frequency, changing mode (Modulation), position transmission speed and antenna transmission power etc., when the electronic tag enters the read range of the reader When interior, the reader could access the data in the electronic tag.
The ATM (ATM) of more than 140 ten thousand although bank establishes in a wide range in the whole world already, to provide user the gold of 24 hours Melt service, but there is thousands of customers up to a hundred or user to go processes financial business to various regions bank daily, except that must withdraw deposit Or filled in person on deposit or account transfer document, or be asked before bank cashier, seem deposit/drawings account number, deposit/drawings account number family Outside name and drawing or deposit or transfer amount, it is also required to provide seal, certificate with discriminating user identity, and input One group of password is compared for bank computer system, and cash can be got after identity identification and password are compared successfully, these Authentication mode is extremely inconvenient for the blunt elder of user's especially knowledge, it is therefore desirable for there is certain electronic tag to store user Information needed for processes financial business, and have certain authentication method to examine the electronic tag true and false and ensure system safety, use The electronic tag can replace the foregoing shortcoming manually filled in.
Current RFID is in the application of high frequency, and fiscard or credit card are combined with cash card consumption, and are widely used In daily life, bus, railway, high ferro, the paying gone sightseeing or done shopping for example are taken, but in parking lot or height Charge station's payment of fast highway, still common vehicle stops is charged by fee-collector, it is therefore desirable for having certain new card and system, no Only in conjunction with RFID superfrequency long range technologies and cash debit facility, on vehicle, vehicle is allowed to pay under steam with generation For the manpower needed for charge, and it is equally applicable to existing RFID high frequencies short-range applications.
Because electronic tag is in addition to the application in financial circles, the still application comprising other industries, seem asset management, Gate inhibition, cash consumption, product resume management, Hospital Drugs and nurse management and project level tracking etc., if certain examines electricity The method of the subtab true and false can be applied in financial circles, then as long as electronic tag is encoded according to category of industry, then this is new Method equally just may be used on other industries, therefore be also contemplated that electronic tag can be encoded according to category of industry, and the new method is just Multi industries can be used for simultaneously, such as certain of the industry with reference to finance, cash card consumption and gate inhibition (Gate Access) Device, so that it may used on new ATM, in convenience store shopping, it is also possible to start the electric equipment in control gate inhibition area.
Mentioned in the patent document of U.S. Patent number 6,130,623 electronic tag, reader and between exchange information Technology, communicated between electronic tag and reader through antenna in RFID modes, the personal information (example in electronic tag Such as the PIN code in mobile phone) be easily intercepted and be stolen, such as using the reader of personation come the individual in reading electronic labels Information.Another situation is to be communicated using the electronic tag of personation with reader, and application processor is then stolen again and is stored up The secret data deposited.Therefore to solve the problem of private file leaks, the patent document proposes the encryption to private file Method.But for protection secret data and ensure that system still expects there is more effective way safely.
In IEEE " a low cost UHF RFID Tag Baseband with an IDEA Cryptography In Engine " paper, the method that IDEA (IDEA) is encrypted is applied to adding for the data in electronic tag It is close, but its used crypto engine needs to increase integrated circuit between reader and electronic tag, such way is not only The computing of complexity is needed, and adds the cost of system.
The content of the invention
In view of shortcoming and the expectation of prior art, the present invention propose the method for improving and solving above-mentioned condition, using RFID Technology and combining that encryption and decryption key, coding, transmission news in brief and adjusting parameter put in order, build according to plural authentication phase A vertical new RFID and its device and a RFID tag Item Processing System are utilized in the method for certification electronic tag The systemic-function of the present invention is applied to multi industries by coding, and transmission news in brief are used as a kind of safe method of Verification System.Whenever When one local computer provides that instruction carries out communication session through a RFID reader and an electronic tag according to communication interface, generally It is that instruction and data are transmitted with frame (Frame), and frame can include timestamp, instruction encoding and parameter, protocol integrated test system (Protocol Control, PC) information, unique items identifier (Unique Item Identifier, UII) and CRC The information such as error detecting code.If the UII be for comprising multipurpose and multi-functional Project Authorization information, seem deposit/drawings account number, Deposit/drawings password, credit card number, face the close code ﹙ of cabinet clothes business and referred to as face the close code ﹚ of cabinet, credit clip pin, compare the frequency of failure, cash Card balance amount information and encryption key etc., then these information will have the block count from 10 to 44 not grades, in different electricity In subtab, it is not required to arrange according to permanent order again between some information, then someone wants to steal from the frame data are eavesdropped Indivedual encrypted messages are taken to be nearly impossible, if because the frame is equal between parameter comprising multigroup parameter information Protection mechanism is enclosed, so the communication link between RFID reader and electronic tag becomes safer, it is necessary on the contrary The place for strengthening protection and anti-eavesdrop is in terms of the electronic tag true and false is examined.
Again in view of bank is come to current user handles the operator that deposit, drawing or ta vservice have to fill out document Formula will do simplification, and the application proposes a kind of method for setting up a Project Information Table for radio frequency identification processing system, the party Method is that have to set up a Project Information Table in the RFID of internal memory at one for user, and the Project Information Table is stored in this Internal memory, the Project Information Table comprising user deposit/drawings account number, face the parameters such as cabinet password and encryption key.When user comes During bank, as long as the electronic tag is placed in the RFID reader of a bank cashier, it is not necessary to fill in deposit or withdraw deposit or transfer accounts Document, the bank cashier in performing a RFID tag Item Processing System program on its local computer, is read through the RFID immediately Take device to read the Project Information Table in the electronic tag, deposit/drawings account of the bank cashier in using the Project Information Table It before information, can first require that user produces one's papers for recognizing its identity, and when withdrawing deposit, also can first require user through numerical key Disk input one faces cabinet password for comparison.After authentication password success, just proceed follow-up operation procedure, it includes will Cash is dumped in the electronic tag.When the Project Information Table is comprising seeming deposit/drawings password or credit clip pin, the electronics Label can be used on a new ATM.Again when the Project Information Table comprising seem cash card remaining sum, cash card shop classification, During the cash card balance amount informations such as cash card goods number, cash card use state, cash card boarding station numbering, so that it may in shop pair The cash card remaining sum of the electronic tag is withholdd or Stored Value.The electronic tag also can be with a superfrequency long range communication antenna knot Conjunction is fabricated to certain device, and in being set up in the electronic tag just like above-mentioned Project Information Table, such as with reference to fiscard card number (or deposit/drawings account number) and cash card or combination credit card number and the function of cash card, then hang the electronic tag from above In vehicle or it is placed in the insertion groove being attached on vehicle, makes that the electronic tag faces vehicle heading and be fixed on can Make left rotation and right rotation or the insertion groove that adjusts upward in, the vehicle can be withholdd with cash under steam in highway or parking lot Mode is paid.When it seems to allow cash card remaining sum to have selection to store certain currency function that the Project Information Table, which is combined, user can Bought foreign currency is stored using the electronic tag in bank, if the selection store certain currency function also can be in other country Shop is used, when user is in consumption, if currency used in family's shop selection spending amount, is held with being stored in the user The kind of currencies of electronic tag is different, then as long as obtaining currency exchange rate to financial center's database through network on-line, The spending amount of user can be exchanged into has identical kind of currencies with cash card remaining sum, to carry out the certification of the electronic tag And cash is withholdd or Stored Value, the electronic tag can be taken as cash to use in the whole world.
Because the Project Information Table includes multipurpose and multi-functional project information, therefore it is necessary to strengthen to the electronic tag The certification of the true and false, therefore the application proposes the plural authentication method for a RFID tag Item Processing System, it recognizes comprising one Demonstrate,prove the electronic tag true and false and confirm that the method for belonging to identical systems faces the method for cabinet password with a certification user.The certification electronics The method of the label true and false, which is included in the electronic tag, to be set up one and has the Project Information Table of coding parameter, in the Project Information Table A project code, a bullets, a Customs Assigned Number and an encryption key are added, the encryption key and the Customs Assigned Number are The true and false for the certification electronic tag and confirm to belong to identical systems, the processing system is selected according to the project code of the electronic tag Power taking subtab, can both increase the efficiency of the processing system, and prevented also from sundry item information in being leaked before certification, decryption is encrypted Key can recognize the true and false of the electronic tag and confirm to belong to identical systems.In addition, in order to increase to the Project Information Table Anti-eavesdrop mechanism, the plural authentication method further proposes the project information that will be stored in the electronic tag memory headroom Table is distinguished into the first memory block information table, the second memory block information table and the 3rd memory block information according to plural authentication phase Table, and the first memory block information table only includes the project information needed for the first authentication phase, such as project code, project are compiled Number, Customs Assigned Number and encryption key, wherein the encryption key by the label sequence number, the Customs Assigned Number and this in second Deposit the generation of block information table length value, the Customs Assigned Number is to start number in order since 1 or a system designator code is digital, and other The project information used in the second authentication phase seems deposit/drawings account number, deposit/drawings password, faced more than cabinet password and cash card Volume information is then stored in the second memory block information table, decrypts encryption key to obtain the second memory block information table length Value, and examine the second memory block information table length value just to read second memory field to confirm to belong to identical systems, then Block information table, other still have needed for project information used after the second authentication phase certification success, such as processing system User's account transfer account number, then be stored in the 3rd memory block information table, this be all increase to the secrecy of the Project Information Table and Anti-eavesdrop mechanism.And the plural authentication method is the another link key for adding an encryption in the second memory block information table, And the link key packet contains one the 3rd memory block information table length value, decryption links key, and obtains the 3rd memory block Information table length value is to read the 3rd memory block information table, the second memory block information table in Different Industries and system It may be selected to be added without the link key of an encryption, but add one and receive news in brief number, believe using the project of the electronic tag When ceasing end of list (EOL), the news in brief of exchange hour, place and transaction summarization composition can be sent to the reception news in brief by the processing system Number, has also given user another mode confirmed using the electronic tag.Due to never transmitting single in each authentication phase Encrypted message, so the plural authentication method provides a kind of false proof, anti-eavesdrop and the most cost-efficient communication side of safety Formula.
When bank cashier performs RFID tag Item Processing System program via reader according to selection instruction selection electronics The project code of label, so that during Project Information Table, electronic tag only can be by its first memory block information in reading electronic labels Table passes the processing system back, and the first memory block information table is the first internal memory comprising project code, Customs Assigned Number, encryption key etc. Block authentication information, and comprising bullets, the PC information for having initial value, CRC16 error detecting codes etc. be the first memory block other Information.And the method for the certification electronic tag true and false includes decryption encryption key, the processing system is according to the certification electronics After the method for the label true and false reads the label identifier of the electronic tag through reader, you can the true and false of the certification electronic tag and Confirmation belongs to identical systems, and obtains the second memory block information table length value i.e. block count in electronic tag, to complete first The certification in stage.And the method that certification user faces cabinet password first requires that user inputs one with numeric keypad including the processing system Authentication password, the processing system reads the second internal memory in the electronic tag after successful decryption encryption key through reader Block information table, it is the second memory block authentication information that it, which includes deposit/drawings account number, faces cabinet password, link key of encryption etc., And comprising deposit/drawings password, compare the frequency of failure, cash card balance amount information be the second memory block other information, the processing system Whether the authentication password that comparison user has first inputted is consistent with the cabinet password that faces read from electronic tag, is comparing password success Afterwards, the processing system just can set up online through network and banking data base, using the deposit/drawings account number as index, obtain the user Data are simultaneously shown on display, the customer identification symbol of such as user, name in an account book, the birthday, address, telephone number, e-mail, And the information such as occupation, following bank cashier can compare identification documents that user first shown whether with the display institute Display data is consistent.After user identity identification certification success, this just completes the certification of second stage, following bank cashier The deposit/drawings account number just can be used to carry out follow-up operation procedure, therefore user is just not necessary to fill in and withdrawn deposit or deposit or the list of account transfer According to.If user is traded using a new ATM, the plural authentication method also includes selecting a certification classification simultaneously by user An authentication password is inputted, the processing system chooses one group of password from the second memory block authentication information as authentication information, so The authentication password of the input and the authentication information of the selection are compared afterwards, after password success is compared, the just link of decryption encryption Key, and the 3rd memory block information table length value i.e. block count is obtained, and when user selects to transfer accounts, the processing system is just It can be read through the reader and be stored in the 3rd memory block information table in the electronic tag, it includes the account transfer account of user preset Number, and the account transfer account number is shown on display, so that user selects and is traded.
When user uses a new ATM, the tagged items processing system is divided into deposit/drawings, transaction with credit and cash Stored Value is merchandised, if deposit/drawings are merchandised, then user inputs its deposit/drawings password through numeric keypad, if transaction with credit, then user Its credit clip pin is inputted, if cash Stored Value is merchandised, then user inputs its cash clip pin.Again when user is carrying out cash card Consumption or during Stored Value, although need not compare authentication information according to current cash card consumption pattern, but in order to prevent cash card or High amount CASH ADVANCE credit card is once lose or stolen and robber's brush, the plural authentication method carried according to the application, and it is only The cabinet password that faces of the memory block of electronic tag second is used as cash clip pin or in second memory block addition one Cash clip pin, and one cash clip pin of input is required by the tagged items processing system, it is necessary to recognize by cash clip pin After card, side carries out cash card and withholdd transaction, is so prevented from that financial card is stolen and robber brushes.
In addition, the method for the certification electronic tag true and false can be applied to many other industries, in addition to financial circles, still should For seeming the industries such as asset management, gate inhibition, cash consumption, transnational production record management, transnational product tracking and managing.Therefore originally As long as application propose by industry, enable function, device, function and implement the class declaration such as country in a parameter seem project In coding, then the project code is stored in the Project Information Table of electronic tag, then for the electronic tag of financial circles certification one The method of the true and false, equally can just be combined with other industries, or be applied to industry even transnational beyond financial circles.Example Comparison authentication information such as is set up in a RFID asset management systems, and after authentication information success is compared, entrance could be obtained The authority that the asset management system is inquired about and modification assets are noted down.Such asset management system is choosing electronics mark through reader During label, so that it may choose electronic tag according to project code, the asset management system can also become more efficiently, it is therefore desirable for electronics Label can have industry, enable function, device, function and the project code for implementing the classifications such as country coding, whole to improve The application of the treatment effeciency and extension certification of RFID Item Processing Systems the electronic tag true and false method.In another example one In RFID gate inhibition's control system, the Project Information Table of an electronic tag is set up comprising seeming that a RFID passes through control card, the RFID Each mandate that can all correspond to a control gate inhibition area in current control card is passed through and used, and control gate inhibition area includes setting Fenced in checkpost or parking lot, the Office Area or building or fitness center locked a door provided with electronics and provided with electric rolling door House or cell or building, when using the electronic tag, with the control gate inhibition Qu Shi that passes through, relatively safe method is first to recognize The true and false of electronic tag is demonstrate,proved, the setting of one for then examining control gate inhibition area to correspond in the current control cards of the RFID, if The position is set as that 1 representative has authorized current and entered the area, so that it may start the electric equipment in control gate inhibition area, it includes opening Dynamic Railings machine, rolling door, warning lamp, siren, electronic lock, illuminator, control gate inhibition's message display and other electrical equipment Equipment, if the position is set as 0 to represent unauthorized current and enter the area, so that it may which the alarm electric equipment for starting control gate inhibition area is set Standby, it includes starting warning lamp, siren or transmission alert news, but when setting up the control gate control system of a safety, no matter inspection Test the electronic tag result how, it is necessary to record every time examine electronic tag, transmission one gate inhibition's news in brief or Email extremely Reception news in brief number in the Project Information Table can also provide the ability of another strengthening system safety.
According to above-mentioned conception, the application proposes to set up in an electronic tag internal memory for a RFID tag Item Processing System The method of one Project Information Table, the electronic tag has label identifier (Tag Identifier, TID), reserved memory (Reserved Memory, RM) space, unique items identifier (Unique Item Identifier, UII) space and User memory (User Memory, UM) space, the label identifier comprising a label sequence number (Tag Serial Number, TagSN) and manufacturer numbering (Manufacturing Identifier), and the method for setting up the Project Information Table is included Set up project in the RM spaces and destroy password and project and access to your password, also comprising the UII spaces are divided into the first memory block letter Table and the second memory block information table are ceased, the UM spaces can be the 3rd memory block information table, and in first memory block letter Cease to set up in table and include the first authentication information, one first encryption key and the first other information, wherein first authentication information Comprising project code and Customs Assigned Number, the Customs Assigned Number is a system constant value or system designator code numeral, this first other Packet contains bullets and the first PC information, and the first PC information is provided with an initial value.Again in the second memory block information Set up in table and include the second authentication information and the second other information, wherein second authentication information includes deposit/drawings password, credit Clip pin, face cabinet service password and cash card remaining sum, second other information comprising deposit/drawings account number, compare the frequency of failure, Cash card remaining sum currency, cash card shop coding, cash card goods number, cash card use state and cash card boarding station are compiled Number.Set up again in the 3rd memory block information table and include the 3rd information table, wherein the 3rd information table includes an account transfer account Number table or a RFID pass through control card or one receive news in brief directory, or more combination.
According to above-mentioned conception, on the other hand the application proposes a RFID tag Item Processing System in the electronic tag of certification one When using a plural certification method, the electronic tag has a label identifier and a tag memory, and the tag memory is according to interior Deposit section and block to distinguish, including divide into reserved memory block, unique items identifier memory block, the first memory field Block, the second memory block and the 3rd memory block, and save project destroys password in the reserved memory block and project is deposited Password is taken, first information table is stored in first memory block, the second information table is stored in second memory block, at this The 3rd information table is stored in 3rd memory block, the plural authentication method is comprised the steps of:According to the project code of electronic tag Choose and check the electronic tag.A first information table is read, the first information table is close comprising the first authentication information, the first encryption Key and the first other information, wherein first authentication information include project code and Customs Assigned Number, the first other information bag Containing bullets, the first PC information, wherein the first PC information indicate first information table length value be block count, and this first plus Close key packet is containing the second encrypted sub-information, and second sub-information is the second information table length value.It is required that user provides status Recognize certificate.It is required that user inputs an authentication password in numeric keypad.Read the label identifier.Decrypt the first encryption key with Obtain second sub-information.Second sub-information is examined to verify that the electronic tag Makoto is pseudo- and belongs to identical systems.Read the Two information tables, second information table includes the second authentication information, the second encryption key and the second other information, wherein this Two authentication informations include deposit/drawings password, face cabinet password and compare the frequency of failure, and second other information includes deposit/drawings Account number and cash card balance amount information, the cash card balance amount information are used comprising cash card remaining sum currency, cash card remaining sum, cash card State and cash card boarding station numbering.User's status is distinguished, the deposit/drawings account number can be used certainly in the tagged items processing system Database obtains a user authentication information, customer identification symbol of the user authentication information including user, name in an account book, birthday, phone number Code, e-mail and address, for comparing user's status.Compare the authentication password and the authentication information.Status identification and The operation procedure that deposit/drawings account number is withdrawn deposit or deposited just can be used in password after comparing successfully.Decrypt the second encryption key with Obtain the 3rd information table length value i.e. block count.According to the 3rd information table block count, to read the 3rd information table, wherein should 3rd information table comprising an account transfer account number table, a RFID pass through control card, one receive news in brief directory, or more combination.Should The deposit/drawings account number and the account transfer account number table can be used to be withdrawn deposit and transferred accounts for tagged items processing system, or according to the cash Card remaining sum currency by drawing unloading is in the cash card remaining sum of the electronic tag and records the transaction, also can by the exchange hour, The news in brief of point and transaction summarization composition are sent to a reception news in brief number.
Brief description of the drawings
The present invention can be understood in more detail from following description, these description be provide by way of example and can It is understood with combining institute's accompanying drawings, wherein:
Fig. 1:The schematic diagram of the application the first preferred embodiment radio frequency identification information system 1;
Fig. 2:The schematic diagram of electronic tag 3 of the preferred embodiment of the application second;
Fig. 3:The preferred embodiment of the application the 3rd is in a financial credit cash certification card (not shown) according to tag memory address Set up the parameter configuration schematic diagram of a Project Information Table 33;
Fig. 4:The preferred embodiment of the application the 3rd is in a financial credit cash certification card (not shown) in its electronic tag 30 user memory block 3E set up the 3rd information table 3E0 schematic diagram;
Fig. 5:The application encrypts the schematic diagram with the first encryption key 352 of decryption;
Fig. 6:The application encrypts the schematic diagram with the second encryption key 370 of decryption;
Fig. 7:The application sets up project and destroys password 3B1 and project and accesses to your password 3B2 method in reserved memory block 3B Schematic diagram;
Fig. 8:The application sets up the second information table 39 in UII memory blocks makes it have the different method signals put in order Figure;
Fig. 9:It is user that the application is used for a radio frequency identification information system in a RFID tag Item Processing System 22 The method schematic diagram of a Project Information Table 33 is set up in an electronic tag 3;
Figure 10:The preferred embodiment RFID tag Item Processing System of the application the 4th is used for a radio frequency identification information system System is using encryption key and password with the method schematic diagram of the electronic tag 3 of certification one;
Figure 11:The preferred embodiment RFID tag Item Processing System of the application the 5th uses a plural rank of authentication method first The message of section changes over time schematic diagram;
Figure 12:The application RFID tag Item Processing System is using the message of a plural authentication method second stage with the time Change schematic diagram;
Figure 13:The preferred embodiment RFID tag Item Processing System 22 of the application the 6th uses a plural number in toll is paid The message of authentication method changes over time schematic diagram;And
Figure 14:The preferred embodiment RFID tag Item Processing System 22 of the application the 7th is used for a radio frequency identification information The schematic diagram of system.
Embodiment
It refer to the accompanying drawing of the present invention to read following detailed description, wherein the accompanying drawing of the present invention is with illustration Mode, to introduce a variety of embodiments of the invention, and for learning how to realize the present invention.The embodiments of the invention provide fill The content of foot, implements disclosed embodiment for those skilled in the art, or implement according to disclosed Content derived from embodiment.On the explanation of specific embodiment, ask those skilled in the art with reference to following content explanation with And can be appreciated that present invention after schema.
Referring to Fig. 1, it is the schematic diagram of the application radio frequency identification information system 1.The radio frequency identification information System 1 includes a radio frequency identification Verification System 2, an electronic tag 3, a network connection device 5, an internet 6, Yi Jiyi Wireless mobile network equipment 7, the radio frequency identification Verification System 2 includes a RFID tag Item Processing System (RFID Tag Item Processing System, RFID TIPS) 22, one network connections 21, one other networks of processing system 24 and one Link 23, the wireless mobile network equipment 7 comprising one using wireless mobile network system running gear, for example using GSM, GPRS certification mobile phone or display, or receive through internet news in brief, image or one of news in brief and image and have the aobvious of IP address Show device or receive the running gear of news in brief number, this action device includes intelligent certification mobile phone, display or server.Electricity Subtab 3 is that the device for having a Project Information Table is set up among its tag memory.In one embodiment, the energy of electronic tag 3 Communication and transinformation are set up according to ISO 18000-6C communication interfaces regulation and a reader.The electronic tag 3 has a label The tag memory 34 of identifier 31 and one, the tag memory 34 can be distinguished according to memory sections and block, and it includes the first memory field Block 36, the second memory block 38, the 3rd memory block 3G and reserved memory block 3B, second memory block 38 can be included First memory block 36, and the 3rd memory block 3G can be a user memory block 3E.Electronic tag 3 further includes an interface And communication control circuit 3K, an antenna 3J, antenna 3J is connected to the interface and communication control circuit 3K, and the interface and communication Control circuit 3K connects the tag memory 34, and the electronic tag 3 can be by the electronic tag internal memory 34, the interface and communication control Circuit 3K and the antenna 3J processed is fabricated to one and pastes label apparatus, or it and insulative potting material are fabricated with into a thickness Card or other shapes device.Antenna 3J can be UHF-antenna to launch and receive superfrequency signal, and the interface And superfrequency signal is converted at label by communication control circuit 3K according to frame mode as defined in superfrequency RFID communication interfaces Reason instruction, for example, choose (Select) electronic tag, examination (Query) electronic tag, access (Access) electronic tag, examination Report (QueryRep), the random code that to look for novelty (Req_RN), reading (Read) tag memory, deposit (Write) tag memory etc. Deng.In a preferred embodiment, antenna 3J can be radio-frequency induction coil to transmit and receive high-frequency signals, and the interface and Communication control circuit 3K can change the high-frequency signals according to frame mode as defined in ISO 18000-3M3 high-frequency RF ID communication interfaces Into tag processes instruction, for example, choose (Select) electronic tag, examination (BeginRound) electronic tag, access (Access) Electronic tag, examination report (NextSlot), the random code that to look for novelty (Req_RN), reading (Read) tag memory, deposit (Write) tag memory etc..Again in a preferred embodiment, antenna 3J can have one group of UHF-antenna simultaneously and one group high Frequency induction coil is to launch and receive superfrequency signal, or transmission and reception high-frequency signals, and the interface and Communication Control are electric Road 3K may be selected that the superfrequency signal is converted into tag processes instruction according to frame mode as defined in superfrequency RFID communication interfaces, Or according to frame mode as defined in high-frequency RF ID communication interfaces by the high-frequency signals be converted into tag processes instruction.The tag memory 34 Save project information table 33, the Project Information Table 33 includes first information table 35, the second information table 37 and the 3rd information table 3E0.First memory block 36 storage first information table 35, the first information table 35 adds comprising the first authentication information 350, first The other information 354 of key 352 and first.Second memory block 38 stores the first information table 35, also stores second and believes Table 37 is ceased, second information table 37 includes the second authentication information 371, the second encryption key 370 and the second other information 372. 3rd memory block 3G stores the 3rd information table 3E0.In a further preferred embodiment, antenna 3J can be high-frequency induction Coil is to transmit and receive high-frequency signals, and the interface and communication control circuit 3K can be provided according to ISO 18000-3 communication interfaces Communication and transinformation are set up with a reader, the electronic tag 3 has a label identifier 31 and a tag memory 34, should Tag memory 34 is distinguished according to memory sections and block, and a Project Information Table 33, project letter can be set up in the tag memory 34 Cease table 33 and include first information table 35, the second information table 37 and the 3rd information table 3E0, the first information table 35 includes first Authentication information 350, the first encryption key 352 and the first other information 354, the interface and communication control circuit 3K are according to the height High-frequency signals are converted into tag processes instruction by frequency RFID communication interfaces regulation, for example, choose (Identify) electronic tag, reading Take (Specific or Group Read) tag memory address, deposit (Specific or Group Write) tag memory Address, pinning (Lock) tag memory address etc..
In one embodiment, the tagged items processing system 22 includes a reader 221, a local computer 222, one number The display 225 of word keyboard 223 and one, the local computer 222 is connected through reader connecting line 22D with the reader 221, It is connected, is connected through display connecting line 22F with the display 225 with the numeric keypad 223 through numeric keypad connecting line 22E. In one embodiment, the local computer 222 is a computer, in a preferred embodiment, and the local computer 222 can be One personal computer, a microcontroller, a micro computer or a work station.The reader 221 connects an antenna 224.It is preferable one In embodiment, the local computer 222 has multiple USB ports, reader connecting line 22D, the numeric keypad connecting line 22E and display connecting line 22F have USB joint to be connected with the local computer 222.The tagged items processing system System 22 is desirable that user inputs password via local computer 222, numeric keypad connecting line 22E and numeric keypad 223. In one preferred embodiment, the numeric keypad 223 is the input keyboard of input numeral and word.The tagged items processing system 22 Message can be output it in visible mode via local computer 222 and display connecting line 22F and be sent to the display 225, it includes a liquid crystal display (LCD), or a transistor (LED) display, or is printed from a printer (Printer) Out.In a preferred embodiment, the tagged items processing system 22 can also the mode of hearing output it message and be sent to The built-in loudspeaker (Microphone) of local computer 222, or an external broadcaster (Speaker), or start a siren (Alarm).The reader 221 can be a transmitting and the reader for receiving superfrequency RFID messages, and the reader 221 includes one Interface and communication control circuit, the interface and communication control circuit should according to frame mode as defined in superfrequency RFID communication interfaces The tag processes instruction of reader 221 is converted into the superfrequency signal for transmitting or receiving between the antenna 224.Another preferable In embodiment, the reader 221 is a transmission and receives RFID high frequencies or the reader of other frequency messages, such as 433MHz, The reader 221 includes an interface and communication control circuit, and the interface and communication control circuit are according to high frequency or other frequencies RFID Frame mode as defined in communication interface by the instruction of the tag processes of the reader 221 be converted between the antenna 224 transmission or The high frequency of reception or other frenquency signals.Again in a preferred embodiment, the reader 221 can combine both of the above simultaneously all The reader for being, the reader 221 includes an interface and communication control circuit, and the interface and communication control circuit may be selected according to spy Frame mode as defined in high-frequency RF ID communication interfaces regulation or high-frequency RF ID communication interfaces refers to the tag processes of the reader 221 Order is converted into the superfrequency signal or high-frequency signals for transmitting or receiving between the antenna 224.Between the antenna 224 and antenna 3J Form a radio frequency identification dedicated channel 226.In one embodiment, the antenna 224 can be that less radio-frequency is distinguished with antenna 3J Know UHF-antenna, the dedicated channel 226 is one several meter of long track (5 to 10 meters is over long distances) or a tens of rice Long air duct (more than 100 meters are remote).Again in a preferred embodiment, the antenna 224 and antenna 3J can be nothings Line radio-frequency discriminating radio-frequency induction coil, the dedicated channel 226 is the insulation matchmaker comprising air and plastics within 1 to 2 or several centimeter It is situated between (less than 5 to 10 centimetres are short distance).Again in a preferred embodiment, the antenna 224 can form one simultaneously with antenna 3J Group radio frequency identification UHF-antenna and one group of radio-frequency induction coil, to launch and receive superfrequency signal, or transmission and Receive high-frequency signals.The tagged items processing system 22 can be through local computer 222, reader connecting line 22D, reader 221 and radio frequency identification dedicated channel 226 and electronic tag 3 carry out mutually transmitting data and authentication procedure.One compared with In good embodiment, the reader 221 can be only fitted in same device with antenna 224, and there is the device plastic casing to be formed Platform, the platform can carry the electronic tag 3.Again in a preferred embodiment, network connections 21 connect the tagged items The local computer 222 of processing system 22 and network connection device 5, the tagged items processing system 22 is by the network connections 21 And the network connection device 5 is connected with internet 6 and wireless mobile network equipment 7, the local computer 222, the reader 221st, antenna 224, display 225 and the numeric keypad 223 are configured in the same apparatus, and such as device is a certification ATM (Authenticating Automatic Teller Machine, abbreviation aATM), the aATM uses a card Insertion groove can also be used an enclosed type platform to carry electronic tag 3 for insertion electronic tag 3, the aATM.Another preferable In embodiment, the tagged items processing system 22 can be via local computer 222 and the mark of the reading electronic labels 3 of reader 221 Label sequence number is exported to a barcode machine (Label Printer) and being imprinted in visible mode and pasted on label, then sticks this Labelling is attached to packing box, packaging bag or the pallet of a product, such as one dress ornament, or a dress product, for a RFID Production Verification System makees shipping management and stock-taking or a RFID security certification system makees antitheft inspection.It is again preferably real one Apply in example, the network connections 21 can be a radio network information channel, the tagged items processing system 22 by the network connections 21, should Network connection device 5 is wirelessly connected with internet 6 and wireless mobile network equipment 7, by the local computer 222, The reader 221, antenna 224, display 225 and the numeric keypad 223 are configured just forms one without traditional thread binding in the same apparatus Put, the wireless device is a RFID certification readers, confess diligent member and read when turning out for work using the tagged items processing system 22 Be fixed on the electronic tag 3 at the station of route of turning out for work, road sign or patrol point, and by relevant station in the electronic tag 3, The news in brief of the information and turn out for work route and the time composition of road sign or patrol point are sent to a RFID and turned out for work Verification System, as One RFID attendance information systems set up a RFID real-time authentications alignment system (Real Time Authenticating Locating System, RTALS) it is used.In a further preferred embodiment, there is the wireless device plastic casing to be formed A hand grip or support, the wireless device is a handheld RFID certification reader, is recognized for hotel owner using a RFID commodity Card system reads the electronic tag 3 pasted and be attached on a commodity, and inquires about the commodity number through the tagged items processing system 22 According to.In a further preferred embodiment, the tagged items processing system 22 is still applied and other through local computer 222 according to industry Device with USB port and the connecting line for having USB joint are connected to input consumption information, and the device includes electronic weighbridge, bar Code scanner, liquid flow measuring device, drinking-water flow measuring unit or global geographic coordinate setting device, the consumption information include the time, away from From, weight, fluid flow, bar code or geographical position longitude and latitude, the consumption information is then converted into spending amount, so that it may Paid using the financial cash certification card of the present invention.
In one embodiment, the radio frequency identification Verification System 2 further includes one or more other processing systems 24, network Link 23 and connect other processing systems 24 and network connection device 5, other processing systems 24 are by the network connections 23, the net Network attachment means 5 are connected with internet 6, wireless mobile network equipment 7.In a preferred embodiment, the network connections 23 Can be a radio frequency network channel, other processing systems 24 can be by the network connections 23, the network connection device 5 with nothing Line mode is connected with internet 6, wireless mobile network equipment 7.Other processing systems 24 can be the same as the tag entry The processing system 24 of mesh processing system 22, its comprising local computer 222, reader 221, antenna 224, display 225 and Numeric keypad 223, can be used as a network finance certification machine (Network Used Financial Authenticating Device, nuFAD), there is the reader 221 platform to be available for carrying electronic tag 3.In a preferred embodiment, this other Processing system 24 can also include the processing system of other devices, and other devices include reader, electronic weighbridge, bar code and swept Retouch instrument, drinking-water flow measuring unit or global geographic coordinate setting device.In a further preferred embodiment, other processing systems 24 can be with Local computer 222, display 225 and numeric keypad 223 are only included, as the total of the radio frequency identification Verification System 2 Manage (Authenticating System Manager, ASM) or make the authentication information station (Authenticating of display inquiry System Kiosk, ASK) or local data base (Local Database, LDB), it is also possible to work is a certificate server (Authenticating Server, AS), such as printer server, transmitting-receiving mail server.Recognize in radio frequency identification TIPS, LDB and ASM in card system 2 are equipped with title, code name, numbering or IP address for identification.Local computer 222 will use resource on network after its operating system is started, and for system security consideration, can use login user and input User cipher interface manages the user of online.The radio frequency identification information system 1 further includes a database 4.Network connection Device 5 links a tagged items processing system 22 and the database 4 with network connections 21, and the network connection device 5 connects with network Knot 23 also links other processing systems 24 and the database 4.In one embodiment, the network connection device 5 may include line concentration Device (Hub), signal gain device (Repeater), connect one or more tagged items processing systems 22 or its elsewhere in a wired fashion Reason system 24, in this way, the tagged items processing system 22 of network connection device 5 and 1 or multiple or other shapes of processing system 24 Into a LAN, the LAN links through internet 6 with a shared database 4 again, the tagged items processing system 22 Can link with the database 4, set up data that are online and accessing the database 4, the database 4 according to RFID industries and Using with a variety of functions, it includes the title or code name, the project code of electronic tag for inquiry tag Item Processing System And its title or code name, the title or code name in shop and commodity, the title of bus route and station or code name, foundation business people Unified number inquires about company or the title of mechanism or its code name, the title of cell or code name and its affiliated area and position and big Building and floor and room, foundation user's deposit/drawings account number inquire about balance of deposits and personal information ... of account etc..Another In embodiment, the network connection device 5 still includes a WiFi wireless access points (Wireless Access Point, AP), with nothing Line mode connects one or more tagged items processing systems 22 or other processing systems 24, in this way, the network connection device 5 and 1 Multiple tagged items processing systems 22 or other processing systems 24 formation one WLAN, the WLAN again with Internet 6, wireless mobile network equipment 7 and shared database 4 link, and the tagged items processing system 22 can be with this Database 4 and the wireless mobile network equipment 7 set up data that are online and accessing the database 4, also can will be short through internet 6 News, image or news in brief and image are sent to the running gear of a display for having IP address or a reception news in brief number.Another In embodiment, the network connection device 5 can in a wired fashion and wireless mode connects one or more tagged items processing systems simultaneously System 22 or other processing systems 24, in this way, the tagged items processing system 22 of network connection device 5 and 1 or multiple or its elsewhere The one Integrated LAN network of formation of reason system 24, the Integrated LAN network is again through internet 6 and shared database 4 and wireless mobile Network equipment 7 is connected, and the tagged items processing system 22 can be with the internet 6, the database 4 and the wireless mobile Network equipment 7, which sets up data that are online and accessing the database 4 or news in brief, image or news in brief and image are sent into one, IP The display of address has the running gear for receiving news in brief number to one.In a preferred embodiment, when user in aATM or When on nuFAD using a financial cash certification card, the tagged items processing system 22 may require that user is defeated using numeric keypad 223 Enter authentication password, the first stage authentication procedure of the application can the first certification financial cash certification card the true and false, just read by rear The information for being stored in electronic tag 3 in the certification card is taken to include an authentication information, a deposit/drawings account number, the second stage of the application Authentication procedure can confirm that the electronic tag 3 belongs to identical systems, and comparing the input authentication password should with certification with the authentication information User's status, sets up online by rear ability with database 4, and the deposit/drawings account number is obtained from database 4 with the deposit/drawings account number The balance of deposits, then through drawing operation procedure and the currency function of selecting the financial cash certification card to be enabled, so that it may one is withdrawn deposit The amount of money is deposited into the financial cash certification card, and the transaction summarization can be sent to one have receive news in brief number running gear.
Referring to Fig. 2, it is the schematic diagram of electronic tag 3 of the preferred embodiment of the application second.Electronic tag in fig. 2 3 further show the Project Information Table 33 comprising the first authentication information 350, the first encryption key 352, first other letter Cease the 354, second authentication information 371, the second encryption key 370, the second other information 372, the 3rd information table 3E0 and retain Stored information in memory block 3B.First authentication information 350 includes a project code 357 and a Customs Assigned Number 355. In one embodiment, the Customs Assigned Number is a system constant value, in a preferred embodiment, and the Customs Assigned Number is a system designator code number Word.First other information 354 includes the PC information 351 of bullets 358 and the first, and wherein the first PC information 351 is to refer to Show the reading memory block RB1 in the first information table 35 such as Fig. 1, in one embodiment, the first PC information 351 is ISO 18000-6C communication interfaces provide or function identical protocol integrated test system (Protocol Control, PC) word group that the PC word groups can For being block count comprising a first information table length value, first encryption key 352 includes the second sub-information 353 of encryption, Second sub-information 353 is that the second information table length value is block count.The decryption of tagged items processing system 22 first encryption is close Key 352 reads the reading memory block RB2 in second information table 39 such as Fig. 2 to obtain second sub-information 353.This second Authentication information 371 includes deposit/drawings password 375, faces cabinet password 377, credit clip pin 37A and cash card remaining sum 379.This Two other informations 372 include deposit/drawings account number 374, credit card number 376 and cash card balance amount information 378.In an embodiment In, the 3rd information table 3E0 includes account transfer account number table 3E1, and in a preferred embodiment, the 3rd information table 3E0 can be included RFID pass through control card 3E2, receive news in brief directory 3E3, or more combination.Reserved memory block 3B save projects are destroyed Password 3B1 and project access to your password 3B2.The Project Information Table 33 further includes project destruction password 3B1 and project access is close Code 3B2.Second encryption key 370 is a link key, and second encryption key 370 includes the 3rd sub-information 373, the 3rd Sub-information 373 is that the 3rd information table length value is block count, and in one embodiment, tagged items processing system 22 is according to the 3rd Sub-information 373 is preferable one to read the 3rd information table 3E0 in user memory block 3E and using account transfer account number table 3E1 Then it is use RFID current control card 3E2 or reception news in brief directory 3E3 in embodiment.
In fig. 2, second memory block 38 includes first memory block 36, and the is stored in second memory block 38 One information table 35 and the second information table 39.In a preferred embodiment, the second memory block 38 can not include the first memory block 36。
Included referring to Fig. 3, it is the preferred embodiment of the application the 3rd in financial credit cash certification card (not shown) One electronic tag 30 sets up the parameter configuration schematic diagram of a Project Information Table 33 according to its tag memory address.As shown in figure 3, the figure Be in units of the word group of 16, encryption key used in the electronic tag of display the application certification one, the password of multigroup purposes, And a Project Information Table 33 for having a coding parameter, the parameter in the Project Information Table 33 has a plurality of word group, for example: Project code 357, credit clip pin 37A, face cabinet password 377, cash card shop coding 37G, cash card goods number 37I etc. and be One word group parameter, cash card remaining sum 379 is two word group parameters, and the first encryption key 352, the second encryption key 370, deposit/drawings are close 375 grades of code are three word group parameters, and deposit/drawings account number 374, credit card number 376 etc. is four word group parameters.The one word group parameter it 0th to the 15th totally 16 can be with parameter name [15:0] represent, such as project code [15:0], credit clip pin [15:0], face Cabinet password [15:0], cash card shop coding [15:0], cash card goods number [15:0] etc., the 0th of the two words group parameter to 31st totally 32 can be with parameter name [31:0] represent, such as cash card remaining sum [31:0], and the 0th of the two words group parameter the to 15 totally 16 be its first word group can be with parameter name [15:0] represent, such as cash card remaining sum [15:0], the two words group parameter The the 16th to the 31st totally 16 be its second word group can be with parameter name [31:16] represent, such as cash card remaining sum [31:16], The the 0th to the 47th of the three words group parameter totally 48 can be with parameter name [47:0] represent, such as the first encryption key [47:0], Two encryption keys [47:0], deposit/drawings password [47:0] etc., and the 0th to the 15th of the three words group parameter totally 16 for its first Word group can be with parameter name [15:0] represent, such as the first encryption key [15:0], the second encryption key [15:0], deposit/drawings password [15:0] etc., the 16th to the 31st of the three words group parameter totally 16 be that its second word group can be with parameter name [31:16] represent, Such as the first encryption key [31:16], the second encryption key [31:16], deposit/drawings password [31:16] etc., the three words group parameter it 32nd to the 47th totally 16 be its 3rd word group can be with parameter name [47:32] represent, such as the first encryption key [47:32]、 Second encryption key [47:32], deposit/drawings password [47:32] etc., the 0th to the 63rd of the four words group parameter can join for 64 totally It is several to claim [63:0] represent, such as deposit/drawings account number [63:0], credit card number [63:0] etc., and the 0th of the four words group parameter to 15th totally 16 be its first word group can be with parameter name [15:0] represent, such as deposit/drawings account number [15:0], credit card number [15:0] etc., the 16th to the 31st of the four words group parameter totally 16 be that its second word group can be with parameter name [31:16] represent, Such as deposit/drawings account number [31:16], credit card number [31:16] etc., the 32nd to the 47th of the four words group parameter totally 16 be it 3rd word group can be with parameter name [47:32] represent, such as deposit/drawings account number [47:32], credit card number [47:32] etc., this four The the 48th to the 63rd of word group parameter totally 16 be its 4th word group can be with parameter name [63:48] represent, such as deposit/drawings account number [63:48], credit card number [63:48] etc..In a preferred embodiment, the block count of parameter can be according in the Project Information Table 33 Industry and application demand and change, or some parameters can be substituted, deleted or added, for example:When close without using the second encryption During key 370, second encryption key 370 can be substituted with the reception news in brief number 370 of one or three word groups or four word groups.The electronic tag 30 tag memory 34 is provided or function identical tag memory using ISO 18000-6C communication interfaces are met.The electronic tag 30 have reservation (Reserved Memory, RM) memory block 3B, label identifier (Tag Identifier, TID) memory field Block 3C, unique items identifier (Unique Item Identifier, UII) memory block 3D and user memory block 3E (User Memory,UM).The tag memory 34 is divided into 4 by the electronic tag 30 according to most left 2 of its tag memory address Memory bank (Memory Bank), this most left 2 are 002Represent TID memory blocks 3C and store a label sequence number 313 and one Manufacturer's numbering 314,012Represent UII memory blocks 3D and store first information table and the second information table, 102Represent in the RM Deposit block 3B and store project and destroy password 3B1 and project and access to your password 3B2 and 112Represent UM memory blocks 3E storages The 3rd information table, the label sequence number 313 be three word group parameters, its 0th to the 15th totally 16 be its first word group, its 16th To the 31st totally 16 be its second word group and its 32nd to the 47th totally 16 be that its 3rd word group can be respectively with label sequence Numbers [15:0], label sequence number [31:16] and label sequence number [47:32] represent, manufacturer's numbering 314 is a word group parameter, Its 0th to the 15th totally 16 can number [15 with manufacturer:0] represent, the project destroys password 3B1 and the project accesses to your password 3B2 be two word group parameters, its 0th to the 15th totally 16 be its first word group can respectively with project destroy password [15:0] and item Mesh accesses to your password [15:0] represent, its 16th to the 31st totally 16 be its second word group can respectively with project destroy password [31: 16] and project accesses to your password [31:16] represent.The preferred embodiment of the application the 3rd applies the present invention to make financial circles Financial credit cash certification card, such as the financial credit cash certification card face cabinet service, selection comprising selection bank and make extra-high The cash certification card of frequency long range or financial cash certification card or credit cash certification card, selection make the short-range finance of high frequency Cash certification card or credit cash certification card or financial credit cash certification card, selection and enterprise or mechanism jointly make superfrequency The cash certification card of long range or financial cash certification card or credit cash certification card and selection are jointly made with enterprise or mechanism Make the short-range cash certification card of high frequency or financial cash certification card or credit cash certification card, and can also be the cash certification The selection of cash card remaining sum 379 of card makes a kind of kind of currencies to store cash, then just the cash certification card can be used to enter Row cash consumption or Stored Value.
Referring to Fig. 3, the memory address 400 in UII memory blocks 3DH~47FHIt is the in Fig. 2 to have 8 word groups One memory block 36 stores the first information table 35, and memory address 480H~5FFHThere are 24 word groups to store second letter Cease table 37.In one embodiment, the tagged items processing system 22 is chosen and checked via reader 221 in the first authentication phase During electronic tag 3, the first information table 35 is the information that the electronic tag 3 replys the reader 221 in backscattering mode, inspection Testing the length value of the first information table 35 can confirm to belong to identical systems with the electronic tag 3, and the first information table 35 includes First PC information 351, project code 357, bullets 358, Customs Assigned Number 355, the first encryption key 352 and a CRC are detectd Error code, the Customs Assigned Number 355 is since the Customs Assigned Number 1.In a preferred embodiment, the Customs Assigned Number 355 is a project Deadline.In a further preferred embodiment, the Customs Assigned Number 355 is system designator code numeral, represents and is set up in an electronic tag Project Information Table system, system designator code numeral includes representing financial certification authority card system with 1,2 represents finance cash certification card System, 3 represent credit cash certification card system, 4 represent financial credit cash certification card system.The tagged items processing system 22 In the second authentication phase, the information of the second information table 37 in the electronic tag 3 is read via reader 221, it includes deposit/drawings Account number 374, credit card number 376, deposit/drawings password 375, credit clip pin 37A, face cabinet password 377, compare the frequency of failure 37E, the second encryption key 370 and a cash card balance amount information 378, the cash card balance amount information 378 include cash card remaining sum Currency 37F, cash card shop coding 37G, cash card goods number 37I, cash card boarding station numbering 37J and cash card make Use state 37K.In a preferred embodiment, the length value of first information table 35 is that block count can be according in UII memory blocks 3D Different Industries and application demand and change, it is not limited to 8 word groups.The tagged items processing system 22 is in successfully passing first After authentication phase, TID memory blocks 3C manufacturer's numbering 314 and label sequence number 313 is read.In one embodiment, the mark Item Processing System 22 is signed when frequency of failure 37E is compared more than a comparison frequency of failure maximum, the tagged items processing system System 22 can produce one group of project according to the label sequence number 313 and destroy password value to start a destruction electronic tag program, the electronics Label 3 can not just talk with the tagged items processing system 22 again.
In figure 3, electronic tag 30 is a word group for having 16 comprising one the oneth PC information 351, and the first PC information The 0th of 351 has 16 to the 15th can be with PC [15:0] represent, the 0th to the 4th totally 5 representative of the first PC information 351 First sub-information can be with PC [4:0] represent, for control read the UII memory blocks block count, the first PC information 351 it 5th to the 15th totally 11 can be with PC [15:5] represent, although the PC [15 in ISO18000-6C communication interfaces regulation:5] it is unrelated The block count of the UII memory blocks is read, but must also be set according to the regulation.In a preferred embodiment, other communications connect Mouth regulation can reduce PC [15:5] digit of 11 to increase by the first sub-information, it is possible to which more word group is read in control Number.In order that the authentication phase of tagged items processing system 22 first only reads first information table 35, therefore in setting up the electronics mark The PC [4 when signing 30:0] it is to be set comprising a first information table length value, for example, 7, the length of expression first information table 35 For 8 word groups, and tagged items processing system 22 obtains the second sub-information 353 when the first encryption key 352 is decrypted, for example For 23, it is 24 word groups to represent the length value of second information table 37, examines the i.e. identifiable electronics mark of second sub-information 353 The true and false of label 3 and confirmation belong to identical systems with the electronic tag 3.In one embodiment, the method for reading memory block RB2 It is that the initial address for specifying second memory block 38 reads block count with one.In a preferred embodiment, termination address quilt It is preset as 01000B, with 5 positions 11111BRepresent from initial address 11111BStart, to successively decrease, 1 mode reads the memory block RB2, to termination address 01000BHave 24 block counts.In another embodiment, second memory block 38 is specified together Beginning address with a termination address to read memory block RB2.Identical method also can be used to read according to the 3rd sub-information 373 Take memory block RB3.
In figure 3, the project code 357 for having a coding is set up according to the application 3rd embodiment, makes the electronic tag 30 For a Project Information Table for having coding.The project code 357 is the word group of one 16, its 0th to the 15th have 16 can be with Project code [15:0] represent, in one embodiment, setting up the method for the project code 357 is included the project code [15:0] 16 classification such as:Project code [15:13] represent the 13rd to the 15th of the project code 357 totally 3 represent RFID industries Subclassification, project code [12:11] represent the 11st to the 12nd of the project code 357 totally 2 represent RFID device subclassification, Project code [10:9] represent the 9th to the 10th of the project code 357 totally 2 represent RFID selections enable function subclassification, Project code [8:6] represent the 6th to the 8th of the project code 357 totally 3 represent RFID functions subclassification and project is compiled Code [5:0] represent the 0th to the 5th of the project code 357 totally 6 represent RFID and implement 4 subclassifications such as national subclassification and compile Code.In one embodiment, the coded system of the RFID industry subclassifications still is made to change, the RFID according to RFID industries and application Industry subclassification is the project code [15:13] 3 definables, 8 kinds of RFID industries are such as:000BRepresent financial circles, 001BRepresent Communications, 010BRepresent logistics, 011BRepresent supply chain, 100BRepresent project level and follow the trail of industry, 101BRepresent gate inhibition and Assets Reorganization Taking Manage industry, 110BRepresent scientific and technological industry, and 111BSystem of representatives blanket insurance stays industry.
The RFID device subclassification is the project code [12:11] 2, be manufacture according to electronic tag and and electronics Label is combined with other devices and must be divided into 4 kinds of devices, in one embodiment, the project code [12:11] it is 00BThen represent with Electronic tag 3 combine be it is non-conductive paste label (Adhesive Label) device, be 01BThen represent and electronic tag 3 With reference to be nonconductive plastic material packaging system, the shape of the device is the card-shape with a thickness, box-like, circle, polygon many Angular or one people's things of symbol or the shape in area, are 10BThe sensing device combined with electronic tag 3 is then represented, it includes Electronic tag 3 is combined with a network indicator or running gear to receive, show and store the device of news in brief or image, is 11B It is other materials device then to represent combined with electronic tag 3, such as using non-conductive timber, leather, non-woven or will be non- Conductive material is attached to any and any combination encapsulating material of metal.
RFID selections enable function subclassification for the project code [10:9] 2, be to be directed to each RFID industry What subclassification user selection to be combined enables function (Enabler), in one embodiment, when the RFID industries subclassification is finance During industry, the project code [10:9] it is 00BRepresentative enables finance, credit, faces cabinet service, gate inhibition, project level tracking and cash The functions such as consumption, are 01BRepresentative enable finance, credit, face cabinet service, cash consumption, the selection of closing balance currency, gate inhibition, with And project level follow the trail of etc. function, 10BRepresentative enable finance, credit, face cabinet service, cash consumption, transmission news in brief, gate inhibition and The functions such as project level tracking, are 11BRepresentative enables finance, credit, faces the functions such as cabinet service, cash consumption and system be reserved.
The RFID functions subclassification is the project code [8:6] 3, be according to electricity for a kind of RFID industries subclassification The function distinguishing that is combined is into 8 kinds of RFID function choosing-items in application for subtab, for example:When the RFID industries subclassification is finance During industry, the project code [8:6] it is 000BRepresent with finance, credit, face cabinet service, cash consumption, transmit news in brief and by The functions such as dynamic formula superfrequency long range, are 001BRepresenting has finance, credit, faces cabinet service, cash consumption, transmit news in brief, show The functions, 010 such as the golden selection of remaining sum currency and passive type superfrequency short distanceBRepresenting has finance, credit, faces cabinet service, shows Gold consumption, the transmission function such as news in brief and passive type superfrequency short distance, are 011BRepresent with finance, credit, face cabinet clothes Business, cash consumption, the transmission function such as news in brief and the high memory size of passive type superfrequency short distance, are 100BRepresenting has gold Melt, credit, face cabinet service, cash consumption, transmission the function such as news in brief and high frequency short distance, be 101BRepresent with finance, letter With, face the functions such as cabinet service, cash consumption, transmission news in brief, cash card remaining sum currency and high frequency short distance, be 110BRepresent With finance, face cabinet service, cash consumption, transmission news in brief, gate inhibition, project level tracking and passive type superfrequency long range etc. Function, is 111BRepresent with finance, face cabinet service, cash consumption, transmission news in brief, gate inhibition, project level follow the trail of and high frequency it is short The functions such as distance.In a preferred embodiment, when the RFID industries subclassification is communications, the project code [8:6] it is 000BRepresenting has remote (more than the 50-100 meters) function of semi-passive (Semi-passive) superfrequency for high-speed railway And position and use between bus traveling, it is 001BRepresenting has semi-passive superfrequency remote and high memory size (8k bytes More than) function, it is 010BRepresenting has passive type superfrequency long range (more than 5-10 meters) function so that patrol is positioned and automatic Change intelligent parking lot to use, be 011BRepresenting has passive type superfrequency over long distances and high memory size (more than 64k bytes) work( Can, it is 100BRepresenting has passive type superfrequency closely (less than 50-100 centimetres) function is used for automated parking ground, For 101BRepresenting has passive type superfrequency closely and high memory size function, is 110BRepresenting has passive type high frequency short distance From (less than 5-10 centimetres) function for gate inhibition's control and patrol positioning use, be 111BRepresenting has passive type high frequency short distance And high memory size function etc..
It is the project code [5 that the RFID, which implements national subclassification,:0] 6, can for a kind of RFID industries subclassification according to Implement country according to the RFID of electronic tag, be divided into 64 countries and region, in one embodiment, the project code [5:0] it is 01H Australian Realm is represented, is 20HTaiwan area is represented, is 60HRepresent area ... of the U.S. etc..
In summary for the explanation of project code 357 and its each subclassification, tagged items processing system 22 can be according to production Industry and application are to the project code [15:0] encoded, for example:In one embodiment, when project code [15:0] it is 0981H When, the plastic clip RFID device for Australian Realm financial circles is represented, and enable finance, credit, face cabinet service, cash consumption, biography The RFID functions such as news in brief, gate inhibition, project level tracking and passive type superfrequency long range are sent, in another embodiment, work as project Coding [15:0] it is 0A68HWhen, the plastic clip RFID device for Taiwan area financial circles is represented, and enable finance, credit, face cabinet Service, cash consumption, transmission news in brief, the selection of closing balance currency, gate inhibition, project level tracking and passive type superfrequency length away from From grade RFID functions.Set up in the electronic tag 30 after a project code 357, the project code 357 can be used as this Applying label Item Processing System 22 chooses the basis of electronic tag 3 via reader 221.
In figure 3, according to the 3rd embodiment of the application, have a bullets 358 has the word group of 16 for one, and is somebody's turn to do The 0th of bullets 358 to the 15th totally 16 can be with bullets [15:0] represent, the method for setting up the bullets 358 It is to be numbered for the RFID industries subclassification of a project code 357 according to its tissue, in one embodiment, when the project is compiled When the RFID industries subclassification of code 357 is financial circles, the bullets [15:0] it is 0007HBank One Corp. can be represented, is 0013H Shi Hua banks of Cathay can be represented, in another embodiment, when the RFID industries subclassification of the project code 357 is logistics, The bullets [15:0] it is 1010HYML company ... etc. can be represented.In a preferred embodiment, the bullets 358 System for the project code 357 RFID industries subclassification according to the son such as its area, position, building (Building) and floor Classify to be numbered.
In figure 3, according to the 3rd embodiment of the application, have a Customs Assigned Number 355 has the word group of 16 for one, and is somebody's turn to do The 0th of Customs Assigned Number 355 to the 15th totally 16 can be with Customs Assigned Number [15:0] represent, in one embodiment, set up the user The method of numbering 355 is numbered in order for the user using the project code 357 and the bullets 358, for example, exist The resident family of the customer or a cell in the student of one school or a member system shop or the employee of a company or a production are online Product and encapsulation product etc. all can in order be numbered since 1.In a preferred embodiment, without using the project code 357 and The bullets 358, the Customs Assigned Number 355 can be set as since 1 in order by the application tagged items processing system 22 Numbering, or it is set as the Project Information Table system that a system designator code digitized representation is set up in an electronic tag, it was included with 1 generation Table financial certification authority card system, 2 represent financial cash certification card system, 3 represent credit cash certification card system, 4 represent finance and believe Certification card system, 5 represent financial gate inhibition's certification card system, 6 represent financial cash gate inhibition's certification card system, 7 represent and believe in cash Gate inhibition's certification card system, 8 represent financial credit cash gate inhibition's certification card system in cash.In a further preferred embodiment, this Mesh coding 357 represents that project level follows the trail of industry and is implemented on the plastic cards that Taiwan has cash consumption passive type high frequency short-range function, , can be by 16 classification of the Customs Assigned Number 355 such as and the bullets 358 represents a RFID fabrications company:Customs Assigned Number [15: 8] represent the 8th to the 15th of the Customs Assigned Number 355 totally 8 represent groups of users (Group) subclassification and Customs Assigned Number [7: 0] represent the 0th to the 7th of the Customs Assigned Number 355 totally 8 represent 2 sub- sorting code numbers such as special discount subclassification, for example exist In one public transportation bus system, the groups of users subclassification is Customs Assigned Number [15:8] 8 and special discount point Class is Customs Assigned Number [7:0] 8 can define simultaneously, for example:01DIt is 100 for its special discount of general passenger %D、02DFor army Alert its special discount % is 80D、04HIt is 70 for its special discount of student %D、05DIt is 0 for its special discount of bus employee %D、 06DIt is 50 for bus employee its special discount of family members %D、08DTo respect the aged people, its special discount % is 50DAnd 10DFor love its Special discount % is 50D... etc..
In a preferred embodiment, tagged items processing system 22 is not built in the electronic tag 30 according to aforesaid class method Vertical project code [15:0], bullets [15:0] and Customs Assigned Number [15:0], such as user does not need RFID industries son point Class, RFID selections enable function subclassification, RFID functions subclassification, RFID device subclassification and RFID and implement state home point The coding of class, then can be by the project code [15 of two 16:0] and bullets [15:0] it is connected, for setting up 1 The mechanism identifier [31 of position:0], such as according to business region and the items of business represent a company or the title of mechanism or its code name or Its people's Unified number of doing business.Again in a preferred embodiment, the project code 357 and the bullets 358 are a mechanism, handset The hybrid coding of structure and building.
In figure 3, the application uses a plural authentication method in a financial cash certification card (not shown) electronic tag 30 The second authentication information 371 set up in second information table 37 needed for second authentication phase and the second other information 372, this second is recognized Card information 371 includes deposit/drawings password 375, faces cabinet password 377, credit clip pin 37A and cash card remaining sum 379, and this second Other information 372 includes deposit/drawings account number 374, credit card number 376 and cash card balance amount information 378.In an embodiment In, the method for certification second authentication information 371 is the tagged items processing system before using second other information 372 22 authentication passwords first to input user are distinguished compared with choosing one group of authentication information from second authentication information 371 pair Whether both are identicalIn one embodiment, when user, which holds a financial certification authority card, comes bank's processes financial business, tag entry Mesh processing system 22 first starts, is placed on as long as the teller user holds it on financial certification authority card and is attached to reader 221 On platform, then will the user input an authentication password using numeric keypad 223, tagged items processing system 22 is according to local meter The setting of the computer classification (CompType) of calculation machine 222, the computer classification has first been set as facing cabinet service computer, certainly should Choose an authentication information in second authentication information 371 to face cabinet password 377, then by it compared with the password that the user inputs It is right, after comparison is errorless, it must just use the deposit/drawings account number 374 to carry out follow-up deposit/drawings transaction, so, bank is not only in the use There is provided when transaction is handled at family and exempt to fill in the intimate service of deposit/drawings document, protection machine also is added to user's deposit/drawings account information System.In a preferred embodiment, it can be financial in opening a bank account and bidding to host one in user to produce the method for facing cabinet password 377 When certification card, bank simultaneously also provide transmission short message service, user can receive a deposit/drawings account number 374, a financial certification authority card, And one be predetermined face cabinet password 377, have the corresponding financial certification authority of deposit/drawings account number 374 and one on the financial certification authority card Card card number, as long as bank cashier sets up the deposit/drawings account number corresponding with user's master data in the database 4 of bank 374 or the financial certification authority card card number, the financial certification authority card just can be used in user.And bank is when the financial certification authority card is set up, One reception news in brief number 370 can be predetermined to be a default value, and face cabinet password 377 to produce random code mode default one, with The deposit/drawings account number 374 is stored in the financial certification authority card in the lump, can be at any time via tag entry when the user is receiving the card Mesh processing system 22 faces cabinet password 377 to change this and faces cabinet password 377 according to what this was predetermined, and is intended to receive the number of news in brief It is stored in the financial certification authority card.In a preferred embodiment, when user uses a financial credit certification card on aATM, label Item Processing System 22 is set as aATM and the certification class of user's selection according to the computer classification of local computer 222 Not, an authentication information can be chosen from second authentication information 371, the authentication information can be deposit/drawings password 375 or credit Clip pin 37A.The method for producing the deposit/drawings password 375 and credit clip pin 37A can be in opening a bank account simultaneously in user When bidding to host a financial credit certification card, bank simultaneously also provide transmission short message service, user can receive a deposit/drawings account number 374 or The finance letters of credit clip pin 37A and one that the deposit/drawings password 375 or one that one credit card number 376, one is predetermined is predetermined With certification card, as long as bank cashier sets up the deposit/drawings account number corresponding with user's master data in shared database 4 374 or credit card number 376, the financial credit certification card just can be used in user.And bank is in setting up the financial credit certification During card, a reception news in brief number 370 can be predetermined to be a default value, and a deposit/drawings password is preset to produce random code mode A 375 or credit clip pin 37A, is stored in the financial credit with the deposit/drawings account number 374 or the credit card number 376 and recognizes in the lump , can be close according to the deposit/drawings that this is predetermined via tagged items processing system 22 at any time when user is receiving the card in card Code 375 or the credit clip pin 37A that is predetermined change the deposit/drawings password 375 or credit clip pin 37A, and are intended to connect The number for receiving news in brief is stored in the financial credit certification card.When the financial certification authority card is in addition to comprising a cash card remaining sum 379, still During comprising a cash card remaining sum currency 37F, bank cashier can first confirm that user has enabled currency conversion, then be needed according to user To be withdrawn deposit from its deposit/drawings account number 374, perform currency conversion, then by Withdrawal Amount unloading in the cash of the financial certification authority card In card remaining sum 379, to facilitate the user to carry.In a further preferred embodiment, when user uses a financial credit on nuFAD During certification card, tagged items processing system 22 can first verify the financial credit certification card the true and false and with the financial credit certification card Belong to identical systems, then the computer classification according to local computer 222 is set as nuFAD, and according to user selection Certification classification, an authentication information can be chosen from second authentication information 371, the authentication information can be deposit/drawings password 375th, cabinet password 377 or credit clip pin 37A are faced, the user can inquire about deposit/drawings account number remaining sum, credit card remaining sum, also may be used So that currency conversion is withdrawn deposit, performed from its deposit/drawings account number 374, then by its Withdrawal Amount unloading in the financial credit certification card In cash card remaining sum 379, in a further preferred embodiment, the transaction summarization is sent to this and connect by tagged items processing system 22 Receive news in brief number 370 and be used as authority and another authentication mode.
In a preferred embodiment, the plural authentication method is believed in a cash certification card (not shown) electronic tag 30 second The second authentication information 371 set up in breath table 37 needed for second authentication phase, second authentication information 371 includes a cash card Remaining sum 379, the method for the certification cash card remaining sum 379 is that before being withholdd, item label processing system 22 will first be verified Deduct cash card Yu E≤0 after spending amountReferring to Fig. 3, the plural authentication method will be screened needed for the first authentication phase The data of electronic tag are built in the first information table 35 of electronic tag 30, the first information table 35 comprising project code 357, Bullets 358, Customs Assigned Number 355, the first PC information 351 and the first encryption key 352, the cash certification card just possess Antiforge function simultaneously belongs to a cash certification card system, and the project code 357 and the bullets 358 can represent company or mechanism Title or its code name or its people's Unified number of doing business, choose the electronic tag 30 as the item label processing system 22 Basis, possesses anti-fraud functional cash certification card and also can be used for RFID project levels to follow the trail of industry such as:One shopping cash certification card with for Buy on behalf thing gift volume and shopping and cash consumption, one by bus cash certification card with by bus and substitute the change of riding for be inconvenient to deposit, One books cash certification card is to pass in and out library and pay library and cash consumption, an amusement cash certification card to pass in and out amusement Area and the public place of entertainment and cash consumption, a cash consumption certification card are paid to pay cash consumption, a phone cash certification in shop Card is consumed with dialing public telephone and cash payment.
Please also refer to Fig. 2 and Fig. 3, the application in order to allow cash certification card to be used in the shop of different businesses as consumption, Being set up in the cash card balance amount information 378 has the cash card shop coding 37G of a coding to be a word group for having 16, and the cash The the 0th to the 15th of card vendor shop coding 37G, which has 16, to encode [15 with cash card shop:0] represent, set up cash card vendor Shop coding 37G method is that the cash card shop is encoded into 37G 16 classification such as:Cash card shop coding [15:12] represent The the 12nd to the 15th of cash card shop coding 37G represents shop business subclassification, cash card shop coding [11 for totally 4:6] Represent that cash card shop coding the 6th to the 11st of 37G represents shop business tissue subclassification and cash card vendor for totally 6 Shop coding [5:0] represent that cash card shop coding the 0th to the 5th of 37G represents shop branch tissue subclassification etc. 3 for totally 6 Individual sub- sorting code number.In a preferred embodiment, 4 of shop business subclassification can classify such as:1HRepresent transportation service Industry, 2HRepresent food and beverage industries, 3HRepresent retail business, 4HRepresent general merchandise industry, 5HRepresent household electrical appliances industry, 6HRepresent show business, 7HGeneration Table path industry and other values represent the shop business subclassification retained, and 6 of shop tissue subclassification are to be directed to a business Shop business subclassification is numbered, such as is that retail business can classify such as shop business subclassification:01HRepresent 7-11 chain Convenience store, 02HRepresent whole family's convenience store, 03HRepresent Yong Bao fresh fruits company, 04HNorth and south coarse cereals company, 05HRepresent good fortune Good fortune drinks manufacturer, 06HRepresent daily automatic vending company and other values system of representatives blanket insurance stays shop to organize subclassification, and pin It is that transport service industry can classify such as to shop business subclassification:01HRepresent Taibei passenger company, 02HRepresent head and superintend and direct passenger traffic public affairs Department, 03HThe shop tissue subclassification that representative too beep stop companies and other combination system of representatives blanket insurances are stayed, and the shop Branch tissue 6 of subclassification is to do business subclassification for a shop and shop tissue subclassification is encoded, for example for Shop business subclassification can classify such as too the beep stop companies of transport service industry:01HRepresent Taibei intellectual circle branch company, 02HRepresent peach garden Zhong Li branch companies, 03HRepresent Tai Zhong clear water branch company, 04HTai Nan Yongkangs branch company, 05HRepresent in peach garden just Airport branch company and other combinations represent the shop branch tissue subclassification of reservation.In summary compiled on cash card shop Cash card shop can be used to encode [15 for the explanation of code and its subclassification coding, tagged items processing system 22:0] to a cash card Consumption shop is encoded, for example:Cash card shop coding [15:0] it is 10C5HThe place for representing customer consumption is in a transport Too the beep stop companies of service trade are in the branch company of Chiang Kai-Shek International Airport in Taoyuan.In a preferred embodiment, the cash card shop Coding 37G, which can be adjusted to 2 word groups, makes its shop business subclassification, shop business tissue subclassification and shop branch tissue The digit of subclassification increases to cover greater number of business tissue and its branch.
In figure 3, the application is in the cash card goods number 37I that the cash card balance amount information 378 foundation has a coding One has a word group of 16, and the 0th to the 15th of cash card goods number 37I totally 16 can be with cash card goods number [15: 0] represent, the method for setting up cash card goods number 37I is that 37G shop definitions shop is encoded for a cash card shop In each commodity be numbered, in a preferred embodiment, the cash card goods number [15:0] compiled for the cash card shop Code 37G carries out 1 to 65,536 goods number wherein 2020 for the chain super business of 7-11 of retail businessDA box banana is represented, one In preferred embodiment, state light passenger company progress 1 of the 37G for transport service industry is encoded for the cash card shopDTo 9999DBar Bus transit route is numbered, wherein cash card goods number [15:0] it is 1818DRepresent the long-distance public transport from the Taibei to middle hole Bus or train route line, in a preferred embodiment, encodes 37G for the cash card shop and is carried out for the online game global corporation of show business 1DTo 9999DPlant video game numbering, wherein cash card goods number [15:0] it is 100DRepresent a kind of network electricity of heroic alliance Competition game is played, or north and south coarse cereals company progress 1 of the 37G for retail business is encoded for the cash card shopDTo 9999DPlant business Product are numbered, wherein cash card goods number [15:0] it is 54DRepresent soya bean.
In figure 3, the application is when user makees cash consumption using a cash certification card, tagged items processing system 22 according to Cash card shop encodes 37G and cash card goods number 37I and carries out the preposition processing (Preprocessing) of consumption, it include according to The true and false according to the plural authentication mode certification cash certification card and belong to identical systems, then will start to measure commodity it The commodity consumption information such as time, distance, weight or flow writes the cash certification card, or in a preferred embodiment, reads The one non-commodity consumption information for measuring commodity, the commodity consumption information includes commodity bar code or its code name or its title.One In embodiment, when user is when showing its cash certification card before the device of tagged items processing system 22 and checking out, the tagged items Processing system 22 can again according to the plural authentication mode certification cash certification card the true and false and belong to identical systems, display is measured Time, distance, weight or the flow of the measurement commodity, and read measurement commodity pass from the monovalent tables of data of a commodity unit In the unit and unit price of time, distance, weight or flow, the commodity consumption information for measuring commodity is converted into cash consumption gold Volume, or in another embodiment, the unit and unit price that non-measurement commodity are read from the monovalent tables of data of the commodity unit are shown, And the quantity of non-measurement commodity is obtained, it will also obtain the non-commodity consumption information for measuring commodity and be converted into the cash consumption amount of money, so Deducting the cash consumption amount of money from the cash card remaining sum of user's cash certification card afterwards, and show and record the transaction includes transmission News in brief or Email are to the reception news in brief number 370.In one embodiment, when passenger shows a cash certification card, to take one remote During the bus of journey Bus Transportation company, the bus uses a wireless bus charging authentication system, and the wireless bus is received Take Verification System with a tagged items processing system 22, the tagged items processing system 22 can the first certification cash certification card it The true and false, belong to identical systems and by bus use state 37K, the Station XXX 37J that then will get on the bus is stored in the cash certification card In, when passenger getting off car shows same cash certification card, the tagged items processing system 22 again the certification cash certification card it The true and false, belong to identical systems and by bus use state 37K, distance by bus calculated by passenger getting on/off Station XXX, And it is converted into the cash consumption amount of money, then deduct the cash consumption amount of money from the cash card remaining sum of the cash certification card.Please Refering to Fig. 3, the application is in the electronic tag 30 except encoding 37G and cash card goods number 37I using the cash card shop Carry out outside the preposition processing of consumption, still setting up has a Customs Assigned Number 357 (calling Rate in the following text), a cash card remaining sum 379 (to call in the following text Balance), cash card use state 37K (calling Status an in the following text) and cash card boarding station numbering 37J (Last Station ID, call LastSID in the following text), it is the use that the application tagged items processing system 22 is used for following the trail of a cash certification card State, in one embodiment, user hold a financial credit cash certification card and take a long-range passenger company bus, the bus Using a wireless bus charging authentication system, the wireless bus charging authentication system has a tagged items processing system 22, the tagged items processing system 22 includes a local computer, a reader, a display 225, a keyboard, a wireless network Network attachment means and one group of systematic parameter, the wireless network attachment means provide second wireless channel, this group of systematic parameter bag Containing a traffic route numbering, a roadway line number according to table and one by bus rate carfare tables of data, the traffic route tables of data bag Each station name and important road sign title containing the traffic route, driver can input day via the keyboard and the display 225 Phase, long-range passenger company coding, bus route numbering and driver's numbering, the tagged items processing system 22 can be via One reader 221 and wireless frequency identification channel 226 are talked with the electronic tag 3 in the cash certification card, to be got on the bus, Get off and withhold and system control procedure, in one embodiment, the tagged items processing system 22 is connected via the wireless network The second wireless channel of device, the wireless channel can be via a WiFi wireless access points and a wireless network linking, to take The bus is obtained in the station name of station of passage in transit or its numbering or its global geographic location coordinate.In a preferred embodiment, The radio channel can be to read the station name of station that semi-passive long-distance electronic tag is included via another RFID reader Or its numbering.All there is a default value to be 0 by Status and LastSID in the financial credit cash certification card, represent that waiting makes With, when user before the device of tagged items processing system 22 when its cash certification card is shown, the tagged items processing system 22 A present Station XXX (Current Station ID, call CurrentSID in the following text) is obtained via the radio channel, according to multiple The true and false of the number authentication mode first certification cash certification card and belong to identical systems, then read the Status of the cash certification card And check Status valuesIf Status=0, program of getting on the bus is carried out, if Status=1, the program of withholing of getting off is carried out, if Other predetermined values of Status=systems, then be authenticated card includes display Status and certification card remaining sum not using program extremely Foot, user do not complete program of getting off, user and do not complete program of getting on the bus or enter the messages such as system authentication user's status pattern, And carry out certification user's status via input Subscriber Number and authentication password, confirming Subscriber Number and authentication password success Afterwards, a systemic-function must be chosen and perform, the systemic-function includes inputting date and driver's numbering, setting traffic route are compiled Number, loading traffic route tables of data, loading ride rate carfare tables of data, inquiry traffic route and its by bus rate carfare, read Take accumulative current collection amount, by pen read gathering record, by pen read CASH ADVANCE record, reset the certification card it Status and LastSID be 0 make the cash certification card to recover to use, cancel single gathering record, removing single gathering and note down, Inquire about traffic route station name of station or its code name, inquiry traffic route timetable, inquiry driving station record and tagged items The selftest (Self-Test) of processing system.Get on the bus program:The tagged items processing system 22 can check CurrentSID= LastSIDIf equal, the tagged items processing system 22 can show that user has paid, and then terminates communication connection, if not Equal, then CurrentSID can be stored in LastSID, the long-range passenger company and encode by the bus tagged items processing system 22 It is stored in cash card shop coding 37G and the route number is stored in cash card goods number 37I, tagged items processing System 22 can be stored in the Status by 1, represent that user has got on the bus, and transmit a transaction news in brief or Email to reception letter Signal code 370, then terminates communication connection.Get off the program of withholing:2 deposits can be somebody's turn to do by the tagged items processing system 22 Status, indicates entry into the program of withholing and is shown in display 225, the tagged items processing system 22 can read cash card vendor Shop encodes 37G and cash card goods number 37I, and then Jian Cha ﹝ cash card shops coding 37G=long-range passenger companies are compiled Ma ﹞ are Ji ﹝ cash card goods numbers 37I=Lu line Bian ﹞If unequal, when representing that user's last time uses the certification card, not Completion is got off the program of withholing, then the tagged items processing system 22 can show that generation is abnormal, and the certification card can not be used instantly, so After terminate communication connection, if equal, the tagged items processing system 22 can check CurrentSID=LastSIDIf equal, Then the tagged items processing system 22 can show that user has got on the bus, and then terminates communication connection, if unequal, represent that user is accurate Standby to get off, then the tagged items processing system 22 can read Rate, LastSID and Balance of the certification card, and with Rate, CurrentSID and LastSID obtained carfare Fare from that should ride in rate carfare tables of data, then checked Balance≧FareIf so, then the tagged items processing system 22 can deduct Fare from the Balance and residue is stored back into this Balance, CurrentSID is stored in LastSID, and the Status can be stored in by 0, expression be withholdd successfully, in display 225 show and transmit a transaction news in brief or Email to the reception news in brief number 370 and record this collection amount, if It is not that then Status can be stored in 3 by the tagged items processing system 22, represent that the Balance is not enough, show in display 225, And this closing balance deficiency record is stored, then the Status can be stored in by 4, indicate entry into a credit card CASH ADVANCE journey Sequence is simultaneously shown in display 225, is then borrowed a quota cash in advance from the credit card number 376 of the user, is added the quota amount of money Entering the Balance, shown in display 225, and record the transaction of this CASH ADVANCE is used as the authority for wanting user charges to include biography Send a transaction news in brief or Email to the reception news in brief number 370, then can be stored in the Status by 2 and again get off withholing Program, if the Balance is still not enough, the 3 deposit Status being repeated into cash card again, Sorry, your ticket has not enough value and borrowing in advance Cash program is untill withholing successfully.In a preferred embodiment, when Balance is not enough, the tagged items processing system 22 can also enter a fiscard cash advance program and be shown in display 225, then from the deposit/drawings account number 374 of the user Pay a quota cash in advance, the quota amount of money is added into the Balance, shown in display 225, and record the pen and pay cash friendship in advance The authority easily paid in advance as user includes the transaction news in brief of transmission one or Email to the reception news in brief number 370.It is preferable one In embodiment, in front of the tagged items processing system 22 is detected via the second wireless channel of the wireless network attachment means There is station name of station or its numbering be next station name of station in its traffic route tables of data or its numbering or important road sign or During its numbering, close station name of station or road sign title can be reported or shown, and transmit news in brief or Email to one wireless Radio-frequency discriminating Verification System and radio frequency identification information system, when detect the signal range that departs from current station or road sign or When person is without passenger getting off car, expected next station name of station can also be reported or shown.In a further preferred embodiment, the label Item Processing System 22 via the wireless network attachment means can with a wireless network linking, wirelessly by a geographical position After information and an attendance information are sent to the bus Verification System 2 of the long-range passenger company and public bus information system 1 with work Continuous processing, the geographical location information may include time, traffic route, car number, driver's numbering, cash certification card card number And certification unusual condition, global geographic latitude and longitude coordinates, the attendance information includes news in brief, image or news in brief and image, wherein short News are default presence states or the people's things for sketching scene, and image can be the photo site shot.
Referring to Fig. 3, can be in the cash card balance amount information according to the adjusted parameter word number of tuples of the application 3rd embodiment 378 add a cash card cargo price and a commodity consumption amount of money, and by cash card boarding station numbering 37J as cash card vendor Product weight is used.In a preferred embodiment, the commodity charging authentication system in a grocery store is by scalable commodity in its shop Spending amount is converted into according to weight, the commodity charging authentication system in the grocery store uses a RFID tag Item Processing System 22, the RFID tag Item Processing System 22 includes local computer, reader, electronic weighbridge, barcode scanner, Yi Jishou According to printer, the reader, the electronic weighbridge, the barcode scanner and the receipt printer are respectively provided with USB joint to insert Enter the USB port of the local computer, the RFID tag Item Processing System 22 also includes the monovalent tables of data of a commodity unit, when User to the grocery store of family done shopping using a cash certification card when, if user determines 2 kilograms of soya bean of purchase, the grocery clerk Trade name or code name first are inputted with the barcode scanner, touch screen or numeric keypad, is made at the RFID tag project The preposition processing of consumption of reason system 22 can obtain the cargo price from the monovalent tables of data of the commodity unit, and salesman uses the electronics again Platform scale scale obtains the commodity weight, then the RFID tag Item Processing System 22 can by the commodity weight office conversion multiplied by with Cargo price, so that it may calculate the spending amount of the commodity, after user verification, and in the RFID tag Item Processing System When showing the cash certification card before 22 devices and checking out, the RFID tag Item Processing System 22 can be according to plural authentication mode certification The true and false of the cash certification card and belong to identical systems, then carry out the program that cash card is withholdd, update and show that the cash is recognized The cash card remaining sum 379 of card, records the trade name or code name, commodity weight and the commodity consumption amount of money, and it is stored To the cash certification card and it is sent to the receipt printer and prints to the user as transaction evidence, also can transmit a transaction News in brief or Email to the reception news in brief number 370 are used as authority and another authentication mode.
In figure 3, the application sets up a cash card balance amount information 378 in electronic tag 30, the cash card balance amount information 378 Further include the word group set up and there is a cash card remaining sum currency 37F to be one 16, the 0th to the 15th of cash card remaining sum currency 37F the Position totally 16 can be with cash card remaining sum currency [15:0] represent, the method for setting up cash card remaining sum currency 37F is by the cash Card remaining sum currency [15:0] 16 classification are such as:Cash card remaining sum currency [15:12] the of cash card remaining sum currency 37F is represented 12 to the 15th totally 4 represent selection currency and exchange the classification of functional check numerals, cash card remaining sum currency [11:8] represent the 8th to 11st totally 4 represent and specify cash card remaining sum storage width and precision form subclassification and cash card remaining sum currency [7: 0] expression the 0th to the 7th represents 3 sub- sorting code numbers such as currency subclassification for totally 8.In a preferred embodiment, the cash card Remaining sum currency 37F can make following coding:The selection currency exchanges functional check numeral and is categorized as cash card remaining sum currency [15: 12] 4 include 16 kinds of states, to show cash card remaining sum currency 37F use state, for example:0000BRepresentative is not yet opened Function, 0001 are exchanged with currencyBRepresent not yet selection currency and exchange function, 0010BRepresentative has selected currency to exchange function, 0011B Represent and specify cash card remaining sum storage width and precision form, 0100BRepresentative completed to enable currency exchange function and Other values system of representatives blanket insurance continues to employ way, and this specifies cash card remaining sum storage width and precision formatter to be categorized as cash card remaining sum Currency [11:8] 4 include 16 kinds of forms, for showing floating-point number variable that the cash card remaining sum 379 is one 32, for example: 0000BRepresent specified width, which width 7 and decimal point 0 floating number, 0001BRepresent the floating-point of specified width, which width 7 and decimal point 1 Number, 0010BThe floating number and other values system of representatives blanket insurance for representing specified width, which width 7 and decimal point 2 stay mode, the currency Subclassification is cash card remaining sum currency [7:0] 8 can be used to represent 256 kinds of national currencies, word or symbol can also be used Conventional national currency is represented, for example:A represent U.S. dollar, B represent sterling, C on behalf of the people coin, E represent Euro, J represent yen, T Represent New Taiwan Currency and other values system of representatives blanket insurance stays mode.In a preferred embodiment, user holds a financial credit cash and recognized When card is consumed, tagged items processing system 22 first the true and false of the certification card and can belong to identical systems, so before withholing Just check that cash card remaining sum currency 37F selection currency exchanges functional check code afterwards, to confirm that the user has enabled the selection Currency exchanges function, and reexamining the currency and the currency of cash card remaining sum currency 37F currency subclassification of the spending amount is It is no identicalIf two kinds of currency are identical, so that it may check that the cash card remaining sum 379 is deducting spending amount Hou≤0If so, just The spending amount is deducted from the cash card remaining sum 379, is showed if it is not, just borrowing a quota cash in advance from the credit card number and being stored in this Gold card remaining sum 379, then once withholdd.If two kinds of currency are differed, just perform currency and exchange function program, by consumption gold Volume is exchanged into the currency of cash card remaining sum currency 37F currency subclassification, then is withholdd, and can thus solve different Exchange rate transfer problem between currency, such as when New Taiwan Dollar is converted into U.S. dollar, to storage conversion after U.S. dollar may comprising member, Angle or point, it is rather inconvenient, if therefore the present invention come as global cash certification card in use, advantage is to not only increase system Anti-fraud system, and the user is not necessary to currency worry again how to store country variant.
Used referring to Fig. 4, it is the application in a financial credit cash certification card (not shown) in its electronic tag 30 Family memory block 3E sets up one the 3rd information table 3E0 schematic diagram.In a preferred embodiment, tagged items processing system 22 is solved The second encryption key 370 in close UII memory blocks 3D is to obtain the 3rd sub-information 373, and the 3rd sub-information is to be stored in use The 3rd information table 3E0 length value is block count in the memory block 3E of family.Fig. 4 (a) is referred to, the figure shows the 3rd information table 3E0 is comprising an account transfer account number table 3E1, the account transfer account number 1 [79 that account transfer account number table 3E1 is included:0], account transfer account number 2 [79:0]、 Account transfer account number 3 [79:0], account transfer account number 4 [79:0], account transfer account number 5 [79:0] and account transfer account number 6 [79:0] be all the 0th to The 79th 5 word group parameters of totally 80.In a preferred embodiment, the 3rd information table 3E0 is still comprising the current control of RFID Table or receive news in brief directory, or more combination, refer to Fig. 4 (b), the 3rd information table 3E0 is includes account transfer account number table One of 3E1, RFID current control card 3E2 and reception news in brief directory 3E3 embodiment, the current control card 3E2 of the RFID are included Control gate inhibition area code [63:0] the reception news in brief number 1 [63 included with reception news in brief directory 3E3:0] and receive news in brief Number 2 [63:0] it is all the 0th to the 63rd 4 word group parameters of totally 64.In a preferred embodiment, tagged items processing system 22 choose reception news in brief number 1 according to RFID industries subclassification coding or receive news in brief number 2 to transmit financial transaction information Or other industry information.In one embodiment, as shown in figure 4, the 3rd memory block 3G is equivalent to user memory block 3E, but 3rd memory block 3G does not include the first memory block 36, and the reading memory block RB3 that the 3rd sub-information 373 is indicated does not include simultaneously First memory block 36.Again in a preferred embodiment, the 3rd information table can be accommodated when UII memory blocks 3D is sufficiently large During 3E0, the 3rd information table 3E0 can be stored in UII memory blocks 3D without being stored in UM memory blocks 3E.
Referring to Fig. 5, it is close to produce the first encryption when Project Information Table 33 is set up according to the application 3rd embodiment The schematic diagram that key 352 is decrypted with it.In one embodiment, as shown in Fig. 5 (a), the first encryption key 352 is by label sequence number 313rd, the sub-information 353 of Customs Assigned Number 355 and second produces to encrypt, and first encryption key 352 can be with 3 word group tables Show such as the first encryption key [47:32], the first encryption key [31:16] and the first encryption key [15:0], or with one 48 Represent such as the first encryption key [47:0].The cryptographic calculation of first encryption key 352 can be the arithmetic of addition and subtraction or patrol Computing is collected, Fig. 5 (a) is an embodiment of add operation.In Fig. 5 (a), label sequence number 313 passes through addition with Customs Assigned Number 355 Computing obtains the first result, and first result obtains the first encryption key with the second sub-information 353 after add operation again 352.In a preferred embodiment, the first encryption key 352 can be believed by the sub-information 353 of label sequence number 313 and second or the second son The multiple of breath 353 is produced encrypting.Again in a preferred embodiment, the first last encryption key 352 can be transported from the encryption Calculate result and capture 1 word group such as the first encryption key [15:, or 2 word groups such as the first encryption key [31 0]:16] and first plus Key [15:0].As shown in Fig. 5 (b), the second sub-information 353 is by the first encryption key 352, label sequence number 313, Yi Jiyong Family numbering 355 obtains to decrypt.The decryption computing of second sub-information 353 can be as shown in Fig. 5 (b).In Fig. 5 (b), first adds Key 352 and label sequence number 313 obtain the second result via subtraction, second result again with Customs Assigned Number 355 via The second sub-information 353 is obtained after subtraction.
Referring to Fig. 6, it, which is the application, produces the second encryption key 370 and its decryption schematic diagram.In one embodiment, As shown in Fig. 6 (a), the second encryption key 370 is encrypted by label sequence number 313 and the 3rd sub-information 373 and obtained, wherein the 3rd Sub-information 373 also can be its multiple, and second encryption key 370 can be represented such as the second encryption key [47 with 3 word groups:32]、 Second encryption key [31:16] and the second encryption key [15:0], or with one 48 represent such as the second encryption key [47: 0].The cryptographic calculation of second encryption key 370 can be arithmetic or the logical operation of addition and subtraction, and Fig. 6 (a) is add operation An embodiment.In Fig. 6 (a), the sub-information 373 of label sequence number 313 and the 3rd obtains second after add operation and added Key 370.In a preferred embodiment, the second encryption key 370 can be exactly the 3rd sub-information 373 or its multiple to encrypt And produce.Again in a preferred embodiment, the second last encryption key 370 can capture 1 from the cryptographic calculation result Word group such as the second encryption key [15:, or 2 word groups such as the second encryption key [31 0]:16] and the second encryption key [15:0]. In Fig. 6 (b), the second encryption key 370 and label sequence number 313 after subtraction inverse operation via obtaining the 3rd sub-information 373.
Referring to Fig. 7, it is to be built according to the application 3rd embodiment in an electronic tag 30 in reserved memory block 3B Project verification mesh is destroyed password 3B1 and project and accessed to your password 3B2 method schematic diagram.Reserved memory block 3B is the internal memory of one 64 Space, the memory headroom, which stores a project, to be destroyed password 3B1 and a project and accesses to your password 3B2, and this two groups of passwords are all two words The parameter of group, must all be set up, in one embodiment, this two groups of passwords can be from the electronics in advance before using electronic tag 3 The label identifier 31 of label 30 captures two of which word group to set up.In a preferred embodiment, the project destroys password 3B1 And the project 3B2 that accesses to your password can be produced from the label sequence number 313 of the label identifier 31 through Hash operation.In the figure 7, first Password shielding 2271 is one 3 word group constants, and label sequence number 313 is one 3 word group parameters, its 0th to the 47th totally 48 can be with TagSN[47:0] represent, be to shield in 48 of 2271 to have the position for being set as 1 according to the first password with the computing of door 227, from TagSN[47:0] corresponding position is captured in 48 as the output signal with door 227.In one embodiment, the application mark Sign Item Processing System 22 and set the first password masking value that first password shielding 2271 is one 48, its value is 000000000001H, the label sequence number 313 shields 2271 processes and the computing of door 227 with the first password, only from the label sequence number 313 acquisitions correspond to the second password masking value and are set as that 1 the 0th TagSN [0] is used as follow-up control signal, to input To one 1 encoders 228.In a preferred embodiment, the 1 of first password shielding 2271 the 0th can will be set in be set in Other positions of first password shielding 2271, the tagged items processing system 22 can capture any from the label sequence number 313 Position is used as the control signal of 1 encoder 228.The encoder 228 has two output signals and is connected to a Hash table (Hash Table) 229, the Hash table 229 has two groups of password setting values.In one embodiment, it is that may be selected according to TagSN [0] The output signal of the Hash table 229 is set as first group of password 2291 or second group of password 2292, when TagSN [0] is 0, The Hash table 229 exports first group of password 2291, and it is 00010000 to obtain first item and destroy password 3B11HDeposited with first item It is 00000001 to take password 3B21H, and when TagSN [0] is 1, the Hash table 229 exports second group of password 2292, obtains the It is 00100000 that two projects, which destroy password 3B12,H3B22 is accessed to your password for 00000010 with second itemH.In a preferred embodiment In, the first password shielding 2271 can set any P certain bits as have 1 other values, can be from label sequence with door computing Numbers 313 capture any P certain bits as control signal subsequently, to input to a N encoder, and the N encoder can be with Output 2NGroup password setting value, to produce corresponding 2NGroup project is destroyed password 3B1 and project and accessed to your password 3B2.
Referring to Fig. 8, it is to set up one second in an electronic tag UII memory blocks according to the application 3rd embodiment to believe Breath table simultaneously makes it have the different method schematic diagrams put in order.Please refer to Fig. 3, the figure shows that the application sets up a finance letter A Project Information Table 33 of certification card in cash, wherein being stored in memory address 480H~5FFHFor the second information table 39, this second Information table 39 include deposit/drawings account number 374, credit card number 376, credit clip pin 37A, face cabinet password 377, compare failure time The parameters, second information table such as number 37E, deposit/drawings password 375, the second encryption key 370 and cash card balance amount information 378 The storage address of each parameter is original alignment order in 39.In a preferred embodiment, each parameter in second information table 39 Storage address can have what is differed to put in order, and the length of the second information table 39 can seem gold according to different certification card systems Melt cash certification card system, credit cash certification card system and cash certification card system and change, in order to avoid second information table Cash card remaining sum 379 is by illegal wiretapping in 39 and alters.In fig. 8, the second password shielding 22A1 has 48 for one by default Position 3 word group constants, label sequence number 313 be one 3 word group parameters its 0th to the 47th totally 48 can be with TagSN [47:0] table Show, be to shield in 48 of 22A1 to have the position for being set as 1 according to second password with door 22A computings, from TagSN [47:0] 48 Corresponding position is captured as the output signal with door 22A in position, and the tagged items processing system 22 is setting up the project information After table 33, shield 22A1 to produce k kinds with not according to the label sequence number 313, the password of the second information table 39 and second With the second information table 39 put in order1,392,393…,39k, wherein k is any numeral between 1 to 16.In an embodiment In, the storage address of each parameter is an original alignment in second information table 39, the memory address pointer of the original alignment for [n, N+1 ..., n+m], wherein n is the storage address that an address pointer indicates 39 first parameters of the second information table, and m+1 is arrangement Adjusting range indicates the number of parameters of second information table 39, and the unit length of parameter can be the word group of one 16, and works as and be somebody's turn to do Second information table 391Address pointer be [n+1, n+2 ..., n+m, n], it represents the storage address of each parameter in the table to the right It has rotated the unit length of a parameter.
In fig. 8, the application tagged items processing system 22 set second password shield 22A1 as one 48 second Password masking value, its value is 00000000000FH, the label sequence number 313 is passed through with second password shielding 22A1 transports with door 22A Calculate, only captured from the label sequence number 313 and correspond to the second password masking value and be set as the 0th to the 3rd of 1 TagSN of totally 4 [3:0] as follow-up control signal, to input to one 4 encoder 22B.In a preferred embodiment, this will can be set in Second password shielding 22A1 the 0th to the 3rd 1 is set in second password shielding other 4 of 22A1, the tag entry for totally 4 Mesh processing system 22 can capture any 4 conducts, 4 encoder 22B control signal from the label sequence number 313.The coding Device 22B has 16 output signals, is connected to an adjustment table (Adjust Table) 22C for its input signal, adjustment table 22C Each input signal have one group of corresponding arrangement adjustment computing, adjustment table 22C is up to 16 groups of arrangements adjustment computings, Arrangement adjustment computing includes arithmetic, logic and the shift operation method of address pointer, makees data in second tables of data To anticlockwise, to right rotation, exchange computing or move to different memory sections or block, for the tagged items processing system Parameters put in order in 22 adjustment second information tables 39, and each label sequence number 313 can take from adjustment table 22C Obtain one group of arrangement adjustment operation method.In a further preferred embodiment, the tagged items processing system 22 by encoder 22B simultaneously Enter adjustment table 22C, second password shields 22A1 and one group of N number of conduct adjustment table is arbitrarily captured from the label sequence number 313 22C N number of adjustment control signal, adjustment table 22C contains up to 2NPlant arrangement adjustment operation method.
Please refer to Fig. 3 and Fig. 8, according to the application 3rd embodiment to illustrate specific embodiment.Implement one In example, the application is when a Project Information Table is set up, and tagged items processing system 22 sets the value that second password shields 22A1 For 00000000000FH, the label sequence number 313 and second password shielding 22A1 pass through with door 22A computings, only from the label sequence Numbers 313 capture and correspond to the TagSN [3 that the second password masking value is set as 1:0] as follow-up 4 encoder 22C control Signal.In one embodiment, as TagSN [3:0] it is 0HWhen, tagged items processing system 22 will choose the from adjustment table 22C One group of arrangement adjusts computing 22C1 to produce second information table 39 with first group of arrangement1.In a preferred embodiment, the group Arrangement adjustment computing 22C1 is that the storage address of each parameter in the second information table 39 is rotated to the right into (Rotate Right) two The original alignment of each parameter is illustrated in figure 3 in word group, second information table 39:Cash card remaining sum [31:16], cash card remaining sum [15:0] ..., deposit/drawings account number [31:16] and deposit/drawings account number [15:0], the storage address of each parameter can be as: 480H、490H、…、5E0HAnd 5F0HRepresent, the storage address of each parameter is moving to right two word groups in second information table 39 Afterwards can be as:4A0H、4B0H... and 490HRepresent, then the deposit/drawings account number [31:16] it is stored in memory address 480H, The deposit/drawings account number [15:0] it is stored in memory address 490H, this creates the terminal the second information table with first group of arrangement 391.In a further preferred embodiment, the arrangement adjustment operation method in adjustment table 22C can include moving to left or only to the left Or to right rotation 1 or other or 0 character, other logical operations can also be included or any computing is not done, or even including with Character or digit adjust putting in order for each parameter.In a further preferred embodiment, as TagSN [3:0] it is 1HWhen, tag entry Mesh processing system 22, which will choose second group of arrangement from adjustment table 22C and adjust computing 22C2 to produce, has the of second group of arrangement Two information tables 392, group arrangement adjustment computing 22C2 is to rotate the storage address of each parameter in the second information table 39 to the left The storage address of each parameter is by from original row as shown in Figure 3 in (Rotate Left) two word groups, second information table 39 Row, can be as after two word groups are moved to left:5E0H、5F0H... and 5D0HRepresent, then the cash card use state [15:0] It is stored in memory address 480H, cash card boarding station numbering [15:0] it is stored in memory address 490H, this creates the terminal with Second information table 39 of second group of arrangement2.In a further preferred embodiment, the arrangement adjustment computing included by adjustment table 22C Method can be leftward or rightward mobile 1 or the computing or other logical operations of other or 0 block, such as by portion Point parameter makees Swap and exchanges computing or Bit Reversal bit reversal computings etc..Again in a preferred embodiment, second password Shielding 22A1 can be other values, and tagged items processing system 22 can be from the label sequence number 313 arbitrarily acquisition 1~N number of position Adjustment table 22C adjustment control signal, makes adjustment table 22C include 21~2NGroup arrangement adjustment operation method.It is again preferable one In embodiment, the internal memory of the electronic tag can be distinguished according to section and block, and adjustment table 22C contains up to 2NPlant and adjust the ground Arithmetic, logic and the shift operation method of location pointer, it includes making the data of the tables of data to make in a block to left-handed Turn, to right rotation, exchange computing or move to different memory blocks or section.
1st group of arrangement adjustment computing 22C1 in Fig. 8, the 2nd group of arrangement adjustment computing 22C2 ... and the 16th group of arrangement is adjusted Whole computing 22C3 still has different storages rules, for example by the cash card remaining sum in the second information table 39, cash card use state, Cash card boarding station numbering, cash card shop coding, cash card goods number ... deposit/drawings account number first according in strange digit groups Deposit address (480H~48FH、4A0H~4AFH、4C0H~4CFH、…5E0H~5EFH) ordered storage, then according to even digit groups Memory address (490H~49FH、4B0H~4BFH、4D0H~4CDH、…5F0H~5FFH) ordered storage.
Know referring to Fig. 9, it is the application RFID tag Item Processing System (RFID TIPS) 22 for a less radio-frequency Other information system (RFID IS) 1 is the method schematic diagram that user sets up a Project Information Table in an electronic tag 3.Please join simultaneously Fig. 3 and Fig. 5 are read to Fig. 9, the RFID IS 1 include a radio frequency identification Verification System (RFID AS) 2 and an electronic tag 3, The electronic tag 3 has a label identifier 31 and a tag memory 34, and the tag memory 34 can come according to memory sections and block Distinguish, the RFID AS 2 include a RFID TIPS 22, the RFID TIPS 22 configure an electronic tag in its working memory Data structure T30 and one group of system constants, this group of system constants include first password shield the 2271, second password shielding 22A1, First information table length value, the second information table length value, the 3rd information table length value, Hash table 229 and adjustment table 22C, should Electronic tag data structure T30 includes RM blocks 3B, TID field block 3C, UII block 3D and UM block 3E, UII blocks 3D Including the first memory block 36 and the second memory block 38, UM blocks 3E can be the 3rd memory block 3G, TID field block 3C Comprising a label identifier 31, the label identifier 31 includes label sequence number 313 and manufacturer's numbering 314, the electronic tag number A Project Information Table 33 is stored according to structure T30, the Project Information Table 33 includes first information table 35, the second information table the 37, the 3rd Information table 3E0, project are destroyed password 3B1 and project and accessed to your password 3B2, and first memory block 36 stores first letter Table 35 is ceased, second memory block 38 stores second information table 37, and UM blocks 3E stores the 3rd information table 3E0, The first information table 35 includes the first authentication information 350, the first encryption key 352 and the first other information 354, and this first Authentication information 350 includes project code 357, Customs Assigned Number 355, and first encryption key 352 includes the second sub-information of encryption 353, first other information 354 includes the PC information 351 of bullets 358 and the first, and second information table 37 is recognized comprising second Information 371, the second encryption key 370 and the second other information 372 are demonstrate,proved, second authentication information 371 includes deposit/drawings password 375th, face cabinet password 377, cash card remaining sum 379 and credit clip pin 37A, second encryption key 370 comprising encryption the Three sub-informations 373, second other information 372 includes deposit/drawings account number 374, credit card number 376 and cash card balance amount information 378, the wherein project code 357 enables function son point including RFID industries subclassification, RFID device subclassification, RFID selections Class, RFID functions subclassification and RFID implement the coding of national subclassification, and the bullets includes being directed to a project code 357 RFID industries subclassification is numbered according to its tissue, and the 3rd information table 3E0 includes an account transfer account number table 3E1, one In preferred embodiment, the 3rd information table 3E0 comprising RFID pass through control card 3E2 or receive news in brief directory 3E3, or more Combination, this method comprises the steps of, step S200:In the working memory of the RFID tag Item Processing System 22, configuration One electronic tag data structure T30, initializes the electronic tag data structure T30 and one group of system constant value, and system system is normal Numerical value includes each parameter in a Project Information Table 33 and the Project Information Table 33, project destruction password 3B1 and the project and deposited Password 3B2 is taken, the Project Information Table 33 includes the first information table 35, the information table of the second information table 37 and the 3rd 3E0.Step S201:Read the label identifier 31 of the electronic tag 30 and be stored in electronic tag data structure T30 mark Identifier 31 is signed, the label identifier 31 includes a label sequence number 313 and manufacturer's numbering 314.Step S202:Foundation should RFID industries subclassification, the RFID device subclassification, the RFID selection enable function subclassification, the RFID functions subclassification, with And it is that the user is encoded that the RFID, which implements national subclassification, to produce the project code 357.Step S203:Foundation should The tissue subclassification of RFID industry subclassifications is that the user is numbered, to produce the bullets 358 and the Customs Assigned Number 355.Step S204:It is encrypted according to the Customs Assigned Number 355, the label sequence number 313 and second sub-information 353, to produce Raw first encryption key 352, second sub-information 353 is the second information table length value, in a preferred embodiment, and this Two information table length values are 24.Step S205:Set the first PC information 351 and include a system initial value, it is first letter Table length value is ceased, in a preferred embodiment, the first information table length value is 7.Step S206:Obtain second information table 37 Middle parameters value or its preset value include deposit/drawings account number 374 and credit card number 376, also including obtaining the second authentication information 371 each authentication password value or its preset value include the deposit/drawings password 375 being used on aATM, credit clip pin 37A, with And be used in that bank faces cabinet face cabinet password 377.Step S207:Carried out according to the sub-information 373 of label sequence number 313 and the 3rd Encryption, to produce second encryption key 370, the 3rd sub-information 373 is the 3rd information table length value, is preferably implemented one In example, second encryption key 370 can be substituted with a reception news in brief number 370.Step S208:According to the label sequence number 313, it is somebody's turn to do First password the shielding 2271 and Hash table 229, generation project destroys password 3B1 and project accesses to your password 3B2.Step S209:One group of arrangement adjustment fortune is obtained according to the label sequence number 313, second password shielding 22A1 and adjustment table 22C Calculate, to adjust each argument address in second information table 39, produce the second information table 39 with different arrangementsN.Step S210: Each parameter value in the 3rd information table 3E0 is obtained, each parameter is comprising an account transfer account number table 3E1 or its predetermined value is obtained, one In preferred embodiment, to obtain the current control card 3E2 of RFID or being 00000000 with default valueHReception news in brief directory 3E3, or more combination.Step S211:Electronic tag data structure T30 is stored to the electronic tag 30, the electronics mark Signing data structure T30 includes the first information table 35, second information table 37, the 3rd information table 3E0, project destruction password 3B1 and the project access to your password 3B2.
Referring to Fig. 10, it is according to the RFID tag Item Processing System (RFID of the 4th preferred embodiment of the application one TIPS) 22 are used for a radio frequency identification information system (RFID IS) 1 using encryption key and password with the electronic tag of certification one 3 method schematic diagram.Please refer to Fig. 3, Fig. 5 to Fig. 8 and Figure 10, the RFID IS 1 recognize comprising a radio frequency identification Card system (RFID AS) 2 and an electronic tag 3, the electronic tag 3 have a label identifier 31 and a tag memory, the mark Label internal memory is distinguished according to memory sections and block, and the RFID AS 2 include a RFID TIPS 22, and the RFID TIPS 22 are included One group of system constant value, this group of system constant value includes first password and shields the 2271, second password shielding 22A1, first information table Length value, the second information table length value and adjustment table 22C, this method include step S301 as shown in Figure 10:The RFID TIPS 22 sets up a Project Information Table 33 in the electronic tag 3 according to plural authentication phase, and the Project Information Table 33 includes first Information table 35, the second information table 39NAnd the 3rd information table 3E0, the wherein first information table 35 includes the first authentication information 350th, the first encryption key 352 and the first other information 354, first authentication information 350 is comprising project code 357 with using Family numbering 355, first other information 354 includes bullets 358 and the first PC information 351, the wherein project code 357 Sorting code number includes RFID industries subclassification, RFID device subclassification, RFID and selects to enable function subclassification, RFID functions son point Class and RFID implement national subclassification, second information table 39NIncluding the second authentication information 371, the second encryption key 370, And second other information 372, second authentication information 371 comprising deposit/drawings password 375, face cabinet password 377, cash card remaining sum 379 and credit clip pin 37A.Step S302:Choosing and check the electronic tag 3 according to the project code 357 includes this The RFID industries subclassification of mesh coding 357, RFID device subclassification, RFID selections enable function subclassification, RFID functions son point Class and RFID implement national subclassification.Step S303:Read the first information table 35.Step S304:Examine the first information The block count of table is the first information table length value.Step S305:The label identifier 31 is read, the label identifier 31 is included The one manufacturer's numbering 314 of label sequence number 313 and one.Step S306:Solved using the label sequence number 313 with the Customs Assigned Number 355 Close first encryption key 352 is to obtain second sub-information 353.Step S307:Examine second sub-information 353 for this second Information table length value is with the true and false of the certification electronic tag 3 and confirms to belong to identical systems with the electronic tag 3.Step S308: Second information table 39 is read according to second sub-information 353N.Step S309:Utilize the label sequence number 313, second password Shield 22A1 and adjustment table 22C and obtain one group of adjustment computing, there is original to obtain through inverse adjustment (Unadjust) computing Begin the second information table 37 arranged.Step S310:Certification second authentication information 371 is with use second other information 372.Step Rapid S311:Second encryption key 370 is decrypted to obtain the 3rd sub-information 373 using the label sequence number 313, indicates the 3rd letter Breath table 3E1 length value is block count, in a preferred embodiment, and second encryption key 370 receives news in brief number 370 by one Substitute, the 3rd sub-information 373 is then a systemic presupposition value.Step S312:The sub-information 373 of certification the 3rd is to read and use 3rd information table 3E0, in a preferred embodiment, then to read and using the 3rd information table 3E0.
Figure 11 is referred to, it is that the preferred embodiment RFID tag Item Processing System of the application the 5th uses a plural certification The method first stage changes over time schematic diagram with the message of the electronic tag of certification one, and the figure is that user holds a financial credit cash Certification is stuck in the embodiment that bank handles deposit/drawings business, and a bank cashier, which has been turned on a local computer 222, includes access originally Ground computer network environment, one group of system constants of setting RFID environment and setting, this group of system constants include computer type CompType is set as " facing cabinet service computer ", first information table length value, the second information table length value, the comparison frequency of failure Maximum, Hash table 229 and adjustment table 22C, the bank cashier also have been turned on the RFID TIPS 22.Please refer to figure 1st, Fig. 3 and Figure 11, this method includes step S501:User shows an electronic tag 3.Step S502:The RFID TIPS 22 Start the reader 221, and enabled according to RFID industries subclassification, RFID device subclassification, the RFID selection of project code 357 Function subclassification and RFID functions subclassification choose an electronic tag through the reader 221 with Select instructions, implement one In example, the condition for meeting selection is the financial credit cash certification card of the superfrequency long range of financial circles, in a preferred embodiment In, the RFID industries subclassification of the project code 357, RFID device subclassification, RFID selections enable function subclassification and RFID functions subclassification can also Select instructions choose electronic tag for other field, and the condition for meeting selection is door Prohibit the short-range financial credit cash certification card of high frequency of industry.Step S503:The RFID TIPS 22 are clear with Inventory instructions Look into electronic tag.Step S504:In one embodiment, the reader 221 is instructed with Query and checks the electronic tag containing superfrequency Card-type device, in a preferred embodiment, the reader 221 check the card containing ultra high frequency IC tag with BeginRound instructions Device.Step S505:In one embodiment, the reader 221 with QueryRep instruction require query report length containing superfrequency away from From the device of electronic tag, in a preferred embodiment, the reader 221 requires that query report contains high frequency with NewSlot instructions The device of short-distance electronic tag.Step 506:In one embodiment, the electronic tag 3 for meeting the condition of being selected passes an inspection back Look into yard RN1 to be received by the RFID TIPS 22 through the reader 221, check code RN1 is the random code RN16 of one 161, In one preferred embodiment, check code RN1 is 16 error detecting code StoredCRC for being stored in the electronic tag.Step 507: The RFID TIPS 22 enclose check code RN1 to read the data of the electronic tag 3.Step S508:The reader 221 is with this The check code RN1 received replys the electronic tag 3.
Step S509:In the electronic tag 3 is indicated after check code RN1 is acknowledged receipt of, according to the first PC information 351 Block RB1 is deposited, the first information table 35 is passed back and is received through reader 221 by the RFID TIPS 22, the first information table 35 is wrapped Detectd containing project code 357, bullets 358, Customs Assigned Number 355, the first encryption key 352, the first PC information 351 and CRC Error code.Step S510:The RFID TIPS 22 verify block count=" first information table length value " of the first information table 35 In a preferred embodiment, the first information table length value is 7, if unequal, represents that occurring unusual condition then enters step S512.If equal, expression is verified and enters step S511:The project of the RFID TIPS 22 checking first information table 35 Coding 357, bullets 358 and Customs Assigned Number 355, to confirm that the electronic tag 3 belongs to identical with the RFID TIPS 22 System, if not verified, enters step S512 to terminate communication session.If by checking, continuing such as the step of Figure 12 S516 authentication method.Step S512:The RFID TIPS 22 terminate the communication session with the electronic tag.Step S513:Read Device 221 is taken to continue to choose next electronic tag.Step S514:The RFID TIPS 22 cut off the communication with the reader 221 It is online.Step S515:The reader 221 cuts off radio frequency power supply.
Figure 12 is referred to, it is that the application RFID tag Item Processing System 22 uses a plural authentication method second stage Schematic diagram is changed over time with the message of the electronic tag of certification one, the continuity that the figure is Figure 11.Please refer to Fig. 1 to Fig. 3, figure 11 and Figure 12, this method comprises the steps of S516:The RFID TIPS 22 require that user is inputted using numeric keypad 223 One authentication password, this is the certification of the second authentication information 371.Step S517:Now bank cashier, which can ask user to show, user The certificate of customer identification symbol is for follow-up comparison, while require that user inputs an authentication password using numeric keypad 223, for User's status of the electronic tag is shown in inspection.Step S518:The RFID TIPS 22 send Read instructions to read the mark Sign identifier 31.Step S519:The reader 221 encloses check code RN1 with Req_RN instructions and requires one to the electronic tag 3 New random code.Step S520:The electronic tag 3 is returned to the reader 221 1 random after handle RN1 is acknowledged receipt of Code RN2, as the handle of subsequent communications, random code RN2 is the random code RN16 of one 162, and by the RFID TIPS 22 Receive.Step S521:The reader 221 encloses handle RN2 to read the label identifier 31 of the electronic tag 3.Step S522:The electronic tag 3 encloses handle RN2 after handle RN2 is acknowledged receipt of, by the label identifier 31 and is returned to reading Device 221 is write, and is received by the RFID TIPS 22, the label identifier 31 is numbered comprising a label sequence number 313 and a manufacturer. Step S523:The RFID TIPS 22 decrypt first encryption key 352 using label sequence number 313 and the Customs Assigned Number 355, with Second sub-information 353 is obtained, second sub-information 353 is that the length value of the second information table 37 is block count.Step S524:Inspection Test " second sub-information 353 "=" the second information table length value "If unequal, then carry out step S532 to terminate with being somebody's turn to do The communication session of electronic tag 3.If equal, then step S525 is carried out:The RFID TIPS 22 enclose this through the reader 221 Handle RN2 is according to second sub-information 353 to read second information table 39 of the electronic tag 3N.Step S526:The electronics Label 3 is after handle RN2 is acknowledged receipt of, by the second information table 39 in second memory block 38NEnclose handle RN2 biographies It is back to reader 221.Step S527:Receive second information table 39N, second information table 39NSystem is by one group of row in Fig. 8 Produced by row adjustment computing.Step S528:The RFID TIPS 22 using the label sequence number 313, the second password shielding 22A1, with And adjustment table 22C obtains one group of arrangement adjustment computing, to second information table 39NImposing inverse arrangement adjustment computing can obtain One has the second information table 39 of original alignment order, and second information table 39 includes the second encryption key 370 and the second certification Information 371, second authentication information 371 includes deposit/drawings password 375, faces cabinet password 377, cash card remaining sum 379 and credit Clip pin 37A.Step S529:Certification letter is chosen from second authentication information 371 according to the computer kenel CompType Breath, the CompType can be aATM, face cabinet service computer, work station or wisdom cashing machine, in one embodiment, should CompType has been set to " facing cabinet service computer " in the application, then according to the CompType local computers can from this second This is selected in authentication information 371 and faces cabinet password 377 for the authentication information, is then compared " authentication information "=" user's input Authentication password "If differing, then into step S536.If identical, then step S530 is carried out:The RFID TIPS 22 are It can be used the second information table 39 for receiving, second information table 39 equivalent to being stored in tag memory address 480 in figure 3HExtremely 5FFHInformation.For example, in one embodiment, the RFID TIPS 22 are using the deposit/drawings account number 374 in Fig. 3 through network connection Device 5 and internet 6 set up online with a shared database 4, and empirical tests its be database user, just can be from the database 4 read the deposit/drawings account number 374 user data, for example status identification code, name in an account book, the birthday, address, programmed emergency and The information such as phone, so that bank cashier confirms to show user's status of the electronic tag a little earlier.Step S531:In the user After status confirms, bank cashier can just carry out deposit subsequently or withdraw deposit or transfer transactions, and the RFID TIPS 22 are in transaction After the completion of the transaction can be stored in database 4, then carry out step S532:Terminate the communication session with the electronic tag 3. Step S533:Reader 221 continues to choose next electronic tag.Step S534:The RFID TIPS 22 are cut off and reader 221 communication connection.Step S535:The reader 221 cuts off RF power supplys.Step S536:Examine " comparison frequency of failure 37E ”≤ " comparing frequency of failure maximum "If so, then carrying out step S539:Start the processing routine for destroying label, in order to avoid by external Intelligent intrusion system, then carries out step S532.If it is not, then carrying out step S537:Frequency of failure 37E increases will be compared The result of 1 time is stored in a buffer Areg.Step S538:Handle RN2 is enclosed via reader 221, using from step The group arrangement adjustment computing of S528 acquirements is lost with obtaining the address pointer after comparison frequency of failure 37E adjustment in the comparison Lose number of times 37E adjustment after address pointer by the comparison frequency of failure 37E of the electronic tag 3 be updated to buffer Areg it Numerical value, then carries out step S532 to terminate the communication session with the electronic tag 3.
Figure 13 is referred to, it is the preferred embodiment RFID tag Item Processing System 22 of the application the 6th in toll is paid Schematic diagram is changed over time using the message of a plural authentication method.In one embodiment, user recognizes a financial credit cash Card hangs in vehicle or is placed in the insertion groove being attached on vehicle that its charging administration system shows by a track The embodiment that gold is withholdd, a Lane regulation person, which has been turned on a local computer 222, to be included access local computer network environment, sets Determine one group of system constants of RFID environment and setting, it is " intelligence that this group of system constants, which include setting computer Type C ompType, Cashing machine ", first information table length value, the second information table length value, comparison frequency of failure maximum, Hash table 229 and tune Whole table 22C, the Lane regulation person also has been turned on the RFID TIPS 22.As shown in figure 13, the step S601 of this method:User goes out Show a financial cash certification card, this shows mode and includes the card is hung in its vehicle or is placed in being attached on vehicle In one insertion groove, card is faced vehicle heading and be fixed on the insertion groove that can make 45 ° of left rotation and right rotation or adjust upward 45 ° In, for RFID TIPS 22 and card foundation communication.Step S602:RFID TIPS 22 start reader 221 and according to item The RFID industries subclassification of mesh coding 357, RFID device subclassification, RFID selections enable function subclassification and RFID functions Subclassification, in one embodiment, the condition that an electronic tag is chosen in setting are the financial credits of the superfrequency long range of financial circles Cash certification card, in a preferred embodiment, RFID industries subclassification, RFID device subclassification, the RFID of the project code 357 Selection enables function subclassification and RFID functions subclassification can be that the financial credit cash of high frequency short distance of gate inhibition's industry is recognized Card.Step S603:Reader 221 sends the condition for choosing electronic tag 3.Step S604:RFID TIPS 22 are via reading Device 221 checks electronic tag.Step S605:Reader 221 sends query report instruction.Step S606:Meet the condition of being selected Electronic tag pass a check code RN3 back, received through reader 221 by RFID TIPS 22, check code RN3 can be 1 The random code RN16 of position3.Step S607:The RFID TIPS 22 enclose check code RN3 through the reader 221 and reply electronics mark Label 3, to read the information of the electronic tag 3.
Step S608:The electronic tag 3 indicates RB1 after check code RN3 is confirmed according to the first PC information 351 The first information table 35 in the first memory block 36 is transmitted, is received through reader 221 by the RFID TIPS 22, first letter Cease table 35 and include project code 357, Customs Assigned Number 355, the first PC information 351 and the first encryption key 352.Step S609: The RFID TIPS 22 examine the block count of the first information table 35 to be the first information table length value, in a preferred embodiment In, the first information table length value is 7, if unequal represent occur unusual condition, into step S624.If equal, then Into step S610:The RFID TIPS 22 send the instruction for reading label identifier 31.Step S611:Reader 221 with Req_RN instructions enclose check code RN3 and require a new random code to electronic tag 31.Step S612:The electronic tag 3 exists Confirm after check code RN3, pass a new random code RN4 back, as the handle of subsequent communications, through the reader 221 by this RFID TIPS 22 are received, and the handle can be the random code RN16 of one 164.Step S613:Reader 221 encloses the handle RN4 is to read the label identifier 31 of the electronic tag 3.Step S614:The electronic tag 3 is passed after handle RN4 is confirmed Give the label identifier 31 to enclose check code RN3, received through reader 221 by the RFID TIPS 22, the label identifier 31 include a label sequence number 313 and manufacturer's numbering 314.
Step S615:The RFID TIPS 22 decrypt first encryption using the label sequence number 313 and the Customs Assigned Number 355 Key 352, if second sub-information 353 is identical with the second information table length value, is confirmed with obtaining one second sub-information 353 The electronic tag 3 being selected is not to forge, and belongs to identical systems with the RFID TIPS 22.
Step S616:The RFID TIPS 22 enclose handle RN4 according to second sub-information 353 through the reader 221 To read the second information table 39 of the electronic tag 3N.Step S617:The electronic tag 3 is after handle RN4 is confirmed, by this Second information table 39NEnclose handle RN4 and pass back and received through the reader 221 by the RFID TIPS 22, second information table 39NSystem is by produced by one group of adjustment arrangement computing in Fig. 8.
Step S618:RFID TIPS 22 using the label sequence number 313, second password of default value shielding 22A1, And adjustment table 22C obtains one group of arrangement adjustment computing, to second information table 39NImposing inverse arrangement adjustment computing can obtain There must be the second information table 39 of original alignment order, second information table 39 includes the second encryption key 370 and the second certification Information 371, second authentication information 371 includes a cash card remaining sum 379.Step S619:The RFID TIPS 22 are first by cash Spending amount deducts from the cash card remaining sum 379 and obtains one " the cash card remaining sum after withholing ", then examines " showing after withholing Gold card remaining sum ”≤0If it is not, then carrying out step S628.If so, then carrying out step S620 when the password that compares is successful:Should RFID TIPS 22 enclose handle RN4 via reader 221, using from the groups of step S618 acquirements arrangement adjustment computing with The address pointer after the cash card remaining sum 379 adjustment is obtained, and in the address pointer after the cash card remaining sum 379 adjustment by the electricity Cash card balance updates in subtab 3 are the cash card remaining sum after withholing.Step S621:The electronic tag 3 is confirming to be somebody's turn to do It is the cash card remaining sum after withholing that the cash card remaining sum 379 is updated after handle RN4, and handle RN4 is transmitted after success to reading Take device 221.Step S622:The reader 221 has been successfully updated the cash card remaining sum 379.Step S623:The RFID TIPS 22 Store the transaction and include the transaction news in brief of transmission one or Email extremely in database 4 and the processing program bag performed after withholing successfully The reception news in brief number 370 is as authority, and in one embodiment, RFID automation Lane regulations system can be opened in long range A fence is opened, and shows or sends current message in real time, in a preferred embodiment, RFID automation power-supply management systems A game machine can be started in short distance.Step S624:The RFID TIPS 22 terminate the communication session with the electronic tag 3. Step S625:Reader 221 chooses next electronic tag.Step S626:The RFID TIPS 22 are cut off and reader 221 It is online.Step S627:The reader 221 cuts off RF power supplys.Step S628:The RFID TIPS 22 are shown on display 225 The cash card remaining sum 379 is not enough.Step S629:The RFID TIPS 22 store the transaction in database 4 and perform mistake of withholing Processing routine after losing, in one embodiment, cash card can be shown or send in real time in RFID automations Lane regulation system The message that Sorry, your ticket has not enough value, in a preferred embodiment, an automatic image identification system (OCR) can obtain a license plate number of the vehicle Code, and the number-plate number, the credit card number and Time of Day are stored in database 4, so that subsequently dispatching bill gives the use Family, then step S624 is carried out, in a preferred embodiment, RFID automation Lane regulation systems can through a cash advance program The cash card remaining sum 379 is given directly to prepay a quota cash, a transaction news in brief or Email is also can transmit to the reception News in brief number 370 is then return to step S619 and once withholdd again as authority.
Figure 14 is referred to, it is the preferred embodiment RFID tag Item Processing System (RFID TIPS) 22 of the application the 7th For the schematic diagram of a radio frequency identification information system (RFID IS) 1, the RFID IS 1 recognize comprising a radio frequency identification Card system (RFID AS) 2 and an electronic tag 3, the electronic tag 3 have a label identifier 31, and the RFID AS 2 include one RFID TIPS 22, the RFID TIPS 22 include a reader 221, a local computer 222, a numeric keypad 223 and One display 225.In fig. 14, the application method of the RFID TIPS 22 is comprised the steps of, step S701:Local computer 222 operating system is activated, in one embodiment, and the operating system is the tag operational system that financial circles and cash consumption are applied Unite (Tag Operating System, TOS), in another embodiment, the operating system is the mark that gate inhibition and supply chain are applied Project operation system (Tag Item Operating System, TIOS) is signed, in another embodiment, the operating system is thing Stream and project level follow the trail of tagged items processing operating system (the Tag Item Processing Operating of application System, TIPOS), in another embodiment, the operating system is the label data operating system (Tag of data handling utility Data Operating System,TDOS).Step S702:Then set up local computer 222 online, access local computer 222 network environment, one RFID environment of access and set the parameter value of one group of RFID tag Item Processing System 22 and held OK, wherein to set up local computer online including through an Internet provider (Internet Service Provider, ISP) Set up local computer and internet and wireless mobile network on-line comprising in a wired fashion, wireless mode or wired and wireless The combination of two ways, to access shared database 4 and transmission news in brief or Email, the network environment includes local computing The title of machine 222 and its code name and its network address, the title of other processing systems 24 and its code name and its network address, data The title in storehouse 4 and its code name and its network address, Position Number and its conference number of the RFID environment including reader 221, Channel bands, link frequency, pulsewidth, modulation mode, position transmission speed, number, antenna port Position Number with antenna port And its transmission power, this group of RFID TIPS 22 parameter value includes one group of external parameter value and includes local computer type CompType, and one group of Inside Parameter Value include project tupe IPMode, type service ServiceType, first password Masking value, the second password masking value, first information table length value, the second information table length value, the 3rd information table length value, comparison Frequency of failure maximum, certification classification AuthenticationType, Hash table 229 and adjustment table 22C, the IPMode bags Project assignment OPERATION, project service SERVICE, project testing TEST are included, the CompType includes cash consumption, wisdom Cashing machine, face cabinet service computer, aATM, nuATM, logistics, supply chain, gate inhibition, project level tracking, traffic, science and technology and be Blanket insurance continues to employ way, and the ServiceType includes setting up tagged items, inquiry tag project, modification tagged items.Step S703: RFID TIPS 22 are actuated to confirm network environment, and the network environment includes database 4.Step S704:The RFID TIPS 22 select project tupe according to IPMode, as IPMode=" OPERATION ", carry out step S724, work as IPMode= When " TEST ", step S710 is carried out, as IPMode=" SERVICE ", step S705 is carried out:The RFID TIPS 22 are selected ServiceType type services, when ServiceType=" modification tagged items ", carry out step S708, when Step S707 is carried out during ServiceType=" inquiry tag project ", when ServiceType=" setting up tagged items ", is entered Row step S706:The RFID TIPS 22 are according to the RFID industries subclassification and bullets 358 of project code 357 in a new electricity Project processing routine of the subtab internal memory to set up Project Information Table and record the event, then carries out step S709 to terminate to lead to News dialogue.Step S707:The RFID TIPS 22 according to the RFID industries subclassification and bullets 358 of project code 357 in One electronic tag internal memory is with queried for items information table and records the project processing routine of the event including transmitting news in brief or electronics postal Then part carries out step S709 to terminate communication session to a reception news in brief number 370.Step S708:The RFID TIPS 22 According to the RFID industries subclassification and bullets 358 of project code 357 in an electronic tag internal memory to change Project Information Table And the project processing routine of the event is recorded including transmitting news in brief or Email to a reception news in brief number 370.Step S709: The RFID TIPS 22 terminate and the communication session of electronic tag 3.
In fig. 14, the application method of the RFID TIPS 22 still includes step S710:The RFID TIPS 22 are according to item The RFID industries subclassification of mesh coding 357 selects project testing classification (TestType), and project testing classification includes a gold medal Melt industry and other test industries, this other test industries include gate inhibition, supply chain, logistics, project level tracking, traffic, science and technology, And system retains industry, when TestType is " financial circles ", step S711 is carried out, when TestType is " other test productions During industry ", step S722 is carried out:The RFID TIPS 22 are according to the RFID industries subclassification and bullets of the project code 357 358 set up and one Project Information Table of test and the project processing routine for recording the event in an electronic tag internal memory, then carry out Step S723 is to terminate communication session.Step S711:The RFID TIPS 22 start a reader.Step S712:The RFID TIPS 22 is tested produces a Project Information Table in an electronic tag internal memory.Step S713:The RFID TIPS 22 tests are read The Project Information Table.Step S714:The test modifications of RFID TIPS 22 Project Information Table.Step S715:The RFID TIPS 22 test the label anti-counterfeit function.Step S716:The RFID TIPS 22 tests compare cryptographic function.Step S717:The RFID TIPS 22 the second information tables of testing and debugging put in order.Step S718:The RFID TIPS 22 are tested against adjustment second letter Breath table puts in order.Step S719:Currency function is withholdd and selected to the RFID TIPS 22 test cash consumptions.Step S720:The RFID TIPS 22 tests produce test report function.Step S721:The RFID TIPS 22 terminate and the electronics mark Sign communication session.Step S723:The RFID TIPS 22 terminate and the communication session of electronic tag 3.
In fig. 14, the application method of the RFID TIPS 22 still includes step S724:The RFID TIPS 22 start should Reader 221 includes setting the RFID environment.Step S725:The RFID TIPS 22 according to project code send selection, examination, And query report instruction, to read an electronic tag 3, in one embodiment, the electronic tag 3 is the gold of superfrequency long range Melt credit cash certification card, in a preferred embodiment, the electronic tag 3 is the short-range financial credit cash certification of high frequency Card.Step S726:The RFID TIPS 22, which are obtained, meets the first information table 35 of selection condition, and the first information table 35 includes the One PC information 351, the first encryption key 352, Customs Assigned Number 355, bullets 358, project code 357 and one 16 CRC error detecting codes.Step S727:Examine block count=" first information table length value " of the first information table 35If unequal, Step S735 is then carried out to terminate communication session.If equal, then read label identifier 31 and carry out step S728:The RFID TIPS 22 selects project application classification according to the RFID industries subclassification and CompType of the project code 357, and the project should With classification include gate inhibition, supply chain, logistics and other application industries, cash consumption, finance and face cabinet service or aATM or NuFAD, if project application classification=" gate inhibition ", carries out step S729, if the classification=" supply chain ", carries out step S730, if project application classification=" logistics and other application industries ", the other application industry includes project level and follows the trail of, hands over Logical, science and technology and system retain industry, then carry out step S731, if project application classification=" cash consumption ", is walked Rapid S732, if project application classification=" finance carries out step S733 with facing cabinet service or aATM or nuFAD ":The RFID TIPS22 is decrypted the key to verify the project processing routine of system, the label true and false and input authentication password.Step S734:After by plural authentication method, the RFID TIPS 22 are read out second information table 37, are transported through an inverse adjustment Calculate to obtain user's deposit/drawings account number 374 and an authentication information, compare the authentication information and the authentication password of input, comparing After success, database 4 just then is accessed using the deposit/drawings account number 374, to complete to deposit or withdraw deposit or transfer transactions, and is remembered Recording the project processing routine of the transaction includes transmission news in brief or Email to a reception news in brief number, then carries out step S735 To terminate communication session.Step S729:The RFID TIPS 22 are decrypted the key to verify that system and the label true and false are used In gate inhibition, and record the event project processing routine include transmission news in brief or Email to one receive news in brief number, then Step S735 is carried out to terminate communication session.Step S730:The RFID TIPS 22 key is decrypted with verify system and The label true and false is used for supply chain, and records the project processing routine of the event and include transmission news in brief or Email to a reception News in brief number, then carries out step S735 to terminate communication session.Step S731:The key is decrypted in the RFID TIPS 22 It is used to logistics and other application industries with verify system and the label true and false, and records the project processing routine of the event including passing Send news in brief or Email to a reception news in brief number, the other application industry includes such as project level tracking, asset management, so Step S735 is carried out afterwards to terminate communication session.Step S732:The RFID TIPS 22 key is decrypted with verify system, The label true and false and cash card remaining sum are enough to withhold and Stored Value for cash consumption, and records the project of the transaction and handle journey Sequence includes transmission news in brief or Email to a reception news in brief number.Step S735:The RFID TIPS 22 terminate and the electronics The communication session of label 3.
In the preferred embodiment of the application the 8th, tagged items processing system 22 is in an electronic tag 30 not exclusively according to such as Method described in Fig. 3 sets up project code [15 in the electronic tag 30:0], bullets [15:0] and Customs Assigned Number [15: 0].In one embodiment, user need not use RFID to implement national subclassification coding, but still need RFID industries subclassification, RFID device subclassification, RFID selections enable the coding such as function subclassification and RFID function subclassifications, in one embodiment, It then may be selected to use the project code [15:0] and the bullets [15:0] link to set up the mechanism identifier of one 32 [31:0], such as a company or the title of mechanism or its code name or its people's Unified number [31 of doing business:0], while will make originally Function subclassification and RFID functions subclassification coding are enabled for RFID industries subclassification, RFID device subclassification, RFID selections The project code [15 used:6], change by another word group or change the 6th to the 15th of the Customs Assigned Number 355 use of totally 10 Family numbering [15:6] set.The electronic tag 3 has a label identifier 31 and an internal memory, and the internal memory can be according to section and block To distinguish, the RFID tag Item Processing System 22 configures an electronic tag data structure T30 and one group in its working memory System constants, this group of system constants include first password shield the 2271, second password shielding 22A1, first information table length value, Second information table length value, computer classification, certification classification, Hash table 229 and adjustment table 22C, the electronic tag data knot Structure T30, which includes RM blocks 3B, TID field block 3C, UII block 3D and UM block 3E, UII blocks 3D, includes the first memory field The memory block 38 of block 36 and second, UM blocks 3E can be the 3rd memory block 3G, and TID field block 3C includes a tag recognition Symbol 31, the label identifier 31 include a label sequence number 313 and manufacturer's numbering 314, the electronic tag data structure T30 according to According to plural authentication phase store a Project Information Table 33, the Project Information Table 33 comprising first information table 35, the second information table 37, Project is destroyed password 3B1 and project and accessed to your password 3B2, and first memory block 36 stores the first information table 35, and this Two memory blocks 38 store second information table 37, and UM blocks 3E stores the 3rd information table 3E0, the first information table 35 include mechanism identifier, the first encryption key 352, the first PC information and Customs Assigned Number 355, and the first PC packets contain The length value of one first information table 35, first encryption key 352 includes one second sub-information 353, and second sub-information 353 is should The length value of second information table 37, in a preferred embodiment, the first information table 35 further include a project deadline (Item Expiration Date) so that the TIPS 22 is examined, second information table 37 includes the second authentication information 371, reception news in brief The other information 372 of number 370 and second, a user cipher can be included by obtaining second authentication information 371, obtain the reception News in brief number 370 can include user or other people Mobile Directory Number, and a RFID can be included by obtaining second other information 372 Current control card, the current control cards of the RFID can be used to manage the logical of multiple control gate inhibition areas concentratedly in second memory block 38 Row and the electric equipment for starting the area, such as a RFID Verification Systems can manage the door of transnational, region and city enterprise concentratedly Prohibit and assets, or manage the control gate inhibition area in hundreds of of hotel of tourism business room and the startup of area's electric equipment, the pipe concentratedly Gate inhibition area processed is including the use of gymnasium, VIP Room, archive office and parking lot, or centralized management administration, education and research and development The control gate inhibition area in a large amount of rooms of mechanism and the startup of area's electric equipment, control gate inhibition area is including the use of office, experiment Room, research department, meeting room and training classroom.In the gate control system of the centralized management, the startup news in each control gate inhibition area Number all passed through with the RFID in control card one it is corresponding.When corresponding position is 1, expression, which has been authorized, passes through and enters the control Gate inhibition area, the electric equipment that must start, show and record must pass through required for the area includes one news in brief of transmission and receives letter to one Signal code 370, the electric equipment include roadway barrier machine, rolling door, warning lamp, siren, electronics lock a door, illuminator, control Gate inhibition's message display and other electric equipments of the area, when corresponding position is 0, expression must not pass through and into the control Gate inhibition area, must start, show and must not record pass through the area electric equipment include transmission one news in brief to one receive news in brief number Code 370.In a preferred embodiment, the RFID passes through control card still using other memory blocks of the electronic tag or section, Such as UM blocks, the startup of the current and electric equipment in centralized management more control gate inhibition area is used as using it.The TIPS 22 Include according to plural authentication phase in the method that an electronic tag 30 sets up a Project Information Table 33:The RFID TIPS 22 are at it An electronic tag data structure T30 and one group of system constant value are configured in working memory, the electronic tag data structure is initialized T30, the electronic tag data structure T30 are stored in a Project Information Table 33, the Project Information Table 33 according to plural authentication phase Parameters, the project are destroyed password 3B1 and the project and accessed to your password 3B2, and the Project Information Table 33 includes the first information Table 35 and second information table 37.The RFID TIPS 22 read the label identifier 31 of the electronic tag 30 and are stored in the electricity Subtab data structure T30 label identifier 31, it includes the label sequence number 313 and manufacturer's numbering 314.The RFID TIPS 22 is recognized according to the user company or the title of mechanism or its code name or its people's Unified number of doing business with producing the mechanism Symbol.The RFID TIPS 22 enable function subclassification and the RFID according to the RFID industries, the RFID device, RFID selections The subclassifications such as function are that the user is encoded, to produce the Customs Assigned Number 355.The RFID TIPS 22 set project cut-off Day, make it have a valid period.The RFID TIPS 22 according to the Customs Assigned Number 355, the label sequence number 313 and this Two sub-informations 353 are encrypted, to produce first encryption key 352, and second sub-information 353 is the second information table length Value.The RFID TIPS 22 set the first PC information 351 and include a system initial value, and it is the first information table length value, In a preferred embodiment, the length value is 7.The RFID TIPS 22 obtain parameters value in second information table 37, its Include the every setting value of the current control cards of RFID for obtaining the user cipher and the user.The RFID TIPS 22 are according to the label Sequence number 313, first password shielding 2271 and the Hash table 229, produce the project and destroy password 3B1 and project access Password 3B2.According to the label sequence number 313, second password shielding 22A1 and adjustment table 22C, one group of arrangement adjustment is obtained Computing, adjusts the parameters address of the second information table 39, produces the second information table 39 with different arrangementsN.The RFID TIPS 22 stores electronic tag data structure T30 to the electronic tag 30, and electronic tag data structure T30 includes should First information table 35, second information table 37, the 3rd information table 3E0, the project destroy password 3B1 and project access Password 3B2.The tagged items processing system 22 is included using the method for the electronic tag 30:The tagged items of the local computer Operating system is activated.Then perform that to set up the local computer online, access local computer network environment, less radio-frequency are distinguished Know one group of system parameter values of environment and initialization, this group of system parameter values include Position Number, meter of the reader 221 Calculation machine classification and the certification classification, wherein the computer classification are that gate inhibition, the certification classification are gate inhibition's certification.It is another compared with In good embodiment, the certification classification further includes logistics certification and supply chain certification.Start the tagged items processing system 22 with true Recognize the local computer network environment.The RFID TIPS 22 start the reader 221, and it includes setting the radio frequency identification Environment.The RFID TIPS 22 choose the electronic tag 30 according to the mechanism identifier.The RFID TIPS 22 read the electronics The first information table 35 of label 30 includes the Customs Assigned Number 355 and the project deadline.The RFID TIPS 22 read the label Identifier 31 includes the label sequence number 313.Examine the length value and the project deadline of first information table 35.The RFID TIPS 22 decrypt first encryption key 352 to obtain the second sub-information 353 using the label sequence number 313 and the Customs Assigned Number 355.Should RFID TIPS 22 examine second sub-information 353 with the true and false of certification electronic tag and confirm to belong to phase with the electronic tag 3 Homologous ray.The RFID TIPS 22 read second information table 39.The RFID TIPS 22 are through an inverse adjustment computing to obtain original Begin the second information table 37 arranged.Certification second authentication information 371 is inputted comprising one authentication information of selection with comparing the user Authentication password, compare successfully rear and can be used second other information 372, the alignments include comparing " the reader bit Numbering is put in the corresponding place value of the current control cards of the RFID "=" 1 "If equal, then the electrical equipment in control gate inhibition area is opened Equipment, and this event is recorded including one news in brief of transmission to the reception news in brief number 370, if unequal, then it is not turned on the control The electric equipment in gate inhibition area, showing " unauthorized enters one's respective area " and recording this event includes one news in brief of transmission to the reception news in brief Number 370.
In the preferred embodiment of the application the 9th, TIPS 22 in an electronic tag 30 not according to method as described in Figure 3 in The electronic tag 30 sets up project code [15:0], bullets [15:0] and Customs Assigned Number [15:0].In an embodiment In, user does not need RFID industries subclassification coding and RFID to implement national subclassification coding, but stills need RFID device son point Class, RFID selections enable the coding such as function subclassification and RFID function subclassifications, in a preferred embodiment, then may be selected By the project code [15:0] and the bullets [15:0] link to set up the cell identifier [31 of one 32:0], such as one Cell or the title of corporations or its code name or its people's Unified number [31 of doing business:0], while original RFID device son point will be used as Class, RFID selections enable the project code [12 that function subclassification and RFID functions subclassification coding are used:6], change by another One word group changes the 9th to the 15th of the Customs Assigned Number 355 Customs Assigned Number [15 of totally 7:9] set.The electronic tag 3 With a label identifier 31 and an internal memory, the internal memory can be distinguished according to section and block, and the RFID TIPS 22 are in its work An electronic tag data structure T30 and one group of system constants are configured in internal memory, this group of system constants are shielded including first password 2271st, the second password shielding 22A1, first information table length value, the second information table length value and Hash table 229, the electronics Tag data structure T30 includes RM blocks 3B, TID field block 3C, UII block 3D and UM block 3E, and UII blocks 3D includes First memory block 36 and the second memory block 38, UM blocks 3E can be the 3rd memory block 3G, and TID field block 3C is included One label identifier 31, the label identifier 31 includes a label sequence number 313 and manufacturer's numbering 314, the electronic tag number A Project Information Table 33 is stored according to plural authentication phase according to structure T30, the Project Information Table 33 includes first information table 35, the Two information tables 37, the 3rd information table 3E0, project are destroyed password 3B1 and project and accessed to your password 3B2, first memory block 36 The first information table 35 is stored, second memory block 38 stores second information table 37, UM blocks 3E stores this 3rd information table 3E0, the first information table 35 includes cell identifier, the first encryption key 352, the first PC information, Yi Jiyong Family numbering 355, the first PC information 351 includes the length value of first information table 35, and first encryption key 352 includes the second son letter Breath 353, second sub-information 353 is the length value of second information table 37, in a preferred embodiment, the first information table 35 A project deadline is further included so that the TIPS 22 is examined, second information table 37 receives news in brief number 370 and 1 the comprising one Two other informations 372, the reception news in brief number 370 can be user or other people Mobile Directory Number, second other letters Breath 372 starts control table comprising one.In one embodiment, the startup control table can only have the word group of one 16, and each is used as The current of one control gate inhibition area of correspondence starts signal.When corresponding position is 1, expression, which has been authorized, passes through and enters control door Forbidden zone, must start and show that the electric equipment in the area that must pass through includes one news in brief of transmission to a reception news in brief number 370, the electrical equipment Equipment includes roadway barrier machine, rolling door, warning lamp, siren, electronic lock, illuminator, control gate inhibition's message display or is somebody's turn to do Other electric equipments of area, when corresponding position is 0, represent that card holder must not pass through and into control gate inhibition area, must start And must not show the pass through electric equipment in the area and include one news in brief of transmission and receive news in brief number 370 to one.In one embodiment, should Start RFID gate inhibition's control system that control table can be used for a cell and medium-sized and small enterprises, its control gate inhibition area includes cell gate door Taboo, building gate inhibition, building meeting room gate inhibition, building office gate inhibition, building reading room gate inhibition, building gymnasium gate inhibition, building Multimedia recreation room gate inhibition, building elevator starter and underground roadways fence starter etc..The TIPS 22 is in an electronics mark The method that label 30 set up a Project Information Table 33 according to plural authentication phase includes:The RFID TIPS 22 are in its working memory An electronic tag data structure T30 and one group of system constant value are configured, electronic tag data structure T30 is initialized, it includes Parameters, the project destroy password 3B1 in one Project Information Table 33, the Project Information Table 33 and the project accesses to your password 3B2, the Project Information Table 33 includes the first information table 35 and second information table 37.The RFID TIPS 22 read the electronics The label identifier 31 of label 30 and the label identifier 31 for being stored in electronic tag data structure T30, it includes the label Sequence number 313 and manufacturer's numbering 314.The RFID TIPS 22 according to user's cell or medium-sized and small enterprises (SME) title or Its code name or its people's Unified number of doing business are to produce the cell identifier.The RFID TIPS 22 are according to the RFID device, RFID Selection enables the subclassification such as function subclassification and the RFID functions and encoded for the user, to produce the Customs Assigned Number 355.The RFID TIPS 22 set the project deadline, are the valid period of the electronic tag before the project deadline. The RFID TIPS 22 are encrypted according to the Customs Assigned Number 355, the label sequence number 313 and second sub-information 353, with First encryption key 352 is produced, second sub-information 353 is the second information table length value.The RFID TIPS 22 are set First PC information 351 includes a system initial value, and it is the first information table length value, in a preferred embodiment, the length Angle value is 7.The RFID TIPS 22 obtain parameters value in second information table 37, and it sets comprising the startup control table is obtained Definite value.The RFID TIPS 22 are produced according to the label sequence number 313, first password shielding 2271 and the Hash table 229 The project is destroyed password 3B1 and the project and accessed to your password 3B2.The RFID TIPS 22 store up electronic tag data structure T30 Deposit to the electronic tag 30, electronic tag data structure T30 include the first information table 35, second information table 37, this Three information table 3E0, the project are destroyed password 3B1 and the project and accessed to your password 3B2.The TIPS 22 uses the electronic tag 30 Method include:The tagged items operating system of the local computer is activated.Then perform that to set up the local computer online, Access local computer network environment, one group of system parameter values of radio frequency identification environment and initialization, this group of systematic parameter Value includes the Position Number of reader 221.The tagged items processing system 22 is actuated to confirm the local computer network ring Border.The RFID TIPS 22 start the reader 221, and it includes setting the radio frequency identification environment.The RFID TIPS 22 The electronic tag 30 is chosen according to the cell identifier.The RFID TIPS 22 read the first information table 35 of the electronic tag 30 Include the Customs Assigned Number 355 and the project deadline.The RFID TIPS 22 read the label identifier 31 and include the label sequence Numbers 313.The RFID TIPS 22 examine the length value and the project deadline of first information table 35.The RFID TIPS 22 are utilized The label sequence number 313 decrypts first encryption key 352 to obtain the second sub-information 353 with the Customs Assigned Number 355.The RFID TIPS 22 examines second sub-information 353 with the true and false of certification electronic tag and confirms to belong to same tie with the electronic tag 3 System.The RFID TIPS 22 read second information table 37.The RFID TIPS 22 using second other information 372 include than To " corresponding place value of the reader Position Number in the startup control table "=" 1 "If equal, start control gate inhibition area Electric equipment, and this event is recorded including transmission news in brief to the reception news in brief number 370, if unequal, do not start the control The electric equipment in gate inhibition area, showing " unauthorized entry one's respective area " and recording this event includes transmission news in brief to the reception news in brief number Code 370.
In summary, explanation of the invention and embodiment have been exposed in, and so its non-is used for limiting the present invention, all this areas Technical staff, is not departing under spirit and scope of the invention, and when that can do various changes and modification, it should belong in the present invention Within the covering scope of patent.
Description of reference numerals
1:Radio frequency identification information system 2:Radio frequency identification Verification System
(RFID IS) (RFID AS)
3:Electronic tag 4:Database
5:Network connection device 6:Internet
7:Wireless mobile network equipment
21:Network connections 22:RFID tag Item Processing System
(RFID TIPS)
23:Network connections 24:Other processing systems
30:Electronic tag 31:Label identifier
33:Project Information Table 34:Tag memory
35:First information table 36:First memory block
37:Second information table 38:Second memory block
39:Second information table 3B:Reserved memory block
3C:Label identifier memory block 3D:Unique items recognize memory block
3E:User memory block 3G:3rd memory block
3J:Antenna 3K:Interface and communication control circuit
221:Reader 222:Local computer
223:Numeric keypad 224:Antenna
225:Display 226:Radio frequency identification dedicated channel
227:With door 228:1 encoder
229:Hash table (Hash Table) 22A:With door
22B:4 encoder 22C:Adjust table (Adjust Table)
22D:Reader connecting line 22E:Numeric keypad connecting line
22F:Display connecting line 313:Label sequence number
314:Manufacturer's numbering 350:First authentication information
351:First PC information 352:First encryption key
353:Second sub-information 354:First other information
355:Customs Assigned Number 357:Project code
358:Bullets 370:Second encryption key
371:Second authentication information 372:Second other information
373:3rd sub-information 374:Deposit/drawings account number
375:Deposit/drawings password 376:Credit card number
377:Face cabinet password 378:Cash card balance amount information
379:Cash card remaining sum 37A:Credit clip pin
37E:Compare frequency of failure 37F:Cash card remaining sum currency
37G:Cash card shop encodes 37I:Cash card goods number
37J:Cash card boarding station numbering 37K:Cash card use state
3B1:Project destroys password 3B2:Project accesses to your password
3E0:3rd information table 3E1:Account transfer account number table
3E2:The current control card 3E3 of RFID:Receive news in brief directory
RB1:Read the RB2 of memory block 1:Read memory block 2
RB3:Read the T30 of memory block 3:Electronic tag data structure

Claims (17)

1. a kind of be used to ensure the processing system of electronic tag, wherein the electronic tag is to be authenticated in authentication phase, and stores up Encryption key and first information table are deposited, the first information table has information table length value, the encryption key is to be derived from the information Table length value, the processing system is included:
Computer;And
Reader, is electrically connected to the computer, wherein:
In the authentication phase, by the reader is used, the decryption computer encryption key is with the certification electronic tag;With And
After the authentication phase, by use the reader, the computer read according to the information table length value this first Information table.
2. processing system as claimed in claim 1, is further included:
Keyboard, is electrically connected to the computer;And
Display, is electrically connected to the computer, wherein:
The computer controls the reader, the keyboard and the display, and is communicated by the reader with the electronic tag;
The electronic tag includes tag memory, and with user;
The tag memory stored tag identifier and Project Information Table;
The label identifier is numbered comprising label sequence number and manufacturer;
The Project Information Table is destroyed password, project and accessed to your password and particular portion comprising the second information table, the first information table, project Point;
Second information table includes the first authentication information, the encryption key and the first other information;
First authentication information includes project code, Customs Assigned Number and project deadline;
The encryption key includes sub-information;
First other information includes bullets and Protocol Control Information;
The first information table includes more than first information unit with the first total information unit numbers, wherein the information table length Value is equal to the first total information unit numbers;
More than first information unit receives news in brief number and the second other information comprising the second authentication information, first, and according to First order is sequentially arranged;
The first reception news in brief number will be by the processing system using to be linked to specific external device (ED), and wherein the specific outside is filled It is running gear to put;
Second other information includes startup control table;
The specific part of the Project Information Table, which has, applies coding information, and comprising second authentication information and this is second other At least one of information;
The processing system provides the 3rd information table and one group of system constants, and wherein this group system constants include computer classification, are System numeral, certification classification, the information table length value, first password shielding, the shielding of the second password, Hash table and adjustment table;
The sub-information represents the information table length value;
The electronic tag is applied to as the application specific functionality performed by the processing system;
The application specific functionality comprising financial function, gate inhibition's control function, cash consumption function, credit card function, face cabinet service Function, toll management function, communication function, logistics function, production management function, work attendance management function, authentication function, business Product peddle management function, Car park payment function, supply chain function, project level tracking function, asset management functions, and combinations thereof At least one;
In establishment stage, the processing system sets up the Project Information Table, and the Project Information Table is written into the electronic tag;
The processing system performs the application specific functionality by using the project code;
In authentication phase after this setup stage, the processing system certification electronic tag;And
After the authentication phase, the processing system produces the friendship for the application specific functionality according to this using coding information Easy message, and the trading message is sent to by the specific external device (ED) according to the first reception news in brief number.
3. processing system as claimed in claim 2, wherein:
3rd information table is raw information table, and comprising more than second information unit with the second total information unit numbers, Wherein the second total information unit numbers are equal to the first total information unit numbers, the information content of more than second information unit The information content of more than first information unit is same as, and more than second information unit is according to different from the first order The second order of order is sequentially arranged;
In the establishment stage, the processing system is set according to the label sequence number, first password shielding and the 3rd information table The fixed first information table, wherein:
The label sequence number has binary value, and the binary value has M position, wherein M>1;
The processing system is shielded according to the first password, selects N number of position to produce the first value, wherein N from the M position>1;
The processing system encodes first value to produce control signal;And
The processing system is adjusted according to the adjustment table, the 3rd information table and the control signal by arrangement adjustment computing is performed Whole second order order is to produce the first information table;
In the authentication phase, the processing system performs authentication algorithm with the certification electronic tag, and the wherein authentication algorithm is read Second information table of the electronic tag, and by the encryption key decryption to determine that the sub-information indicates whether the information table length Value;
When the sub-information represents the information table length value, the processing system confirms that the authentication algorithm passes through certification;
After the electronic tag is by the authentication algorithm, the processing system reads the electronics mark according to the information table length value The first information table of label;And
After reason system reads the first information table in this place, the processing system is shielded according to the label sequence number, the first password With the first information table, the first information table is converted into the 4th information table by execution inverse arrangement adjustment computing, wherein:
4th information table includes the 3rd many information units;
The information content of 3rd many information units is same as the information content of more than second information unit;
3rd many information units are put in order and are arranged according to being same as the 3rd of the second order order;And
The processing system performs the inverse arrangement adjustment computing to produce according to the adjustment table, the first information table and the control signal Raw 4th information table.
4. processing system as claimed in claim 2, wherein:
Second authentication information, which is further included, is contained within this using the cash card remaining sum in coding information;
The application specific functionality is the cash consumption function, and is performed by using the cash card remaining sum;
Before the establishment stage, the processing system by preset using default number this first receive news in brief number;
In the establishment stage, the processing system sets the first reception news in brief number by the first user input is received;
The processing system updates the cash card remaining sum to form cash card balance updates by the application specific functionality is performed;
The processing system is according to the cash card balance updates, and it is specific outer so that the trading message is sent into this to produce the trading message Part device;And
It is certified into the electronic tag really to belong to the processing system after identical systems, when the user is desired Between, the processing system receives news in brief number by the second user input received from the user with the user desired second Substitute the first reception news in brief number.
5. processing system as claimed in claim 2, wherein:
The computer is local computer;
The electronic tag is radio RF identification label;
The reader includes reader antenna and the first interface for being electrically connected to the reader antenna and Control on Communication electricity Road, the wherein reader antenna include at least one of the first ultra-high frequency antenna and the first high-frequency inductor coil;
The electronic tag further include label antenna and be electrically connected to the label antenna and the tag memory the second interface and Communication control circuit, the wherein label antenna comprising the second ultra-high frequency antenna and the second high-frequency inductor coil at least within it One;
The startup control table includes multiple positions, and is contained within this using in coding information, and the plurality of position corresponds respectively to multiple Start signal;
The application specific functionality is gate inhibition's control function, and is performed by using the startup control table to control specific tube The electric equipment in gate inhibition area processed, the wherein specific control gate inhibition area are used for the user and the application dress that control has the electronic tag One of put;
The plurality of position includes certain bits, and the certain bits are used to control the specific startup signal in the plurality of startup signal, Wherein this it is specific start signal control the electric equipment with determine the user and the application apparatus wherein this one whether be allowed to Into the specific control gate inhibition area;
The certain bits represent one of licensing status and unauthorized state;
When the certain bits represent the licensing status, the processing system by perform the application specific functionality, make the user and The application apparatus wherein this one be allowed to enter the specific control gate inhibition area;
When the certain bits represent the unauthorized state, the processing system by perform the application specific functionality, make the user and The application apparatus wherein this one be prohibited from entering the specific control gate inhibition area;
The processing system produces the trading message trading message is sent into the specific external device (ED) according to the certain bits;
In the establishment stage, the processing system is according to the predetermined wireless radio-frequency discriminating function combined with the electronic tag, setting The project code, wherein:
The predetermined wireless radio-frequency discriminating function is comprising the financial function, the credit card function, this faces cabinet service function, the cash and disappear Take function, news in brief transmitting function, cash card remaining sum currency selection function, gate inhibition's control function, project level tracking function, the spy Determine at least one of hyperfrequency access distance applications function, specific high frequency access distance applications function and its combination,
The specific hyperfrequency access distance applications function is passive type hyperfrequency length access distance applications function, passive type hyperfrequency Short access distance applications function, the short access distance applications function of the passive type hyperfrequency with relatively high memory size, high frequency are short Access distance applications function, semi-passive hyperfrequency length access distance applications function, when the electronic tag move for positioning Semi-passive hyperfrequency far access distance applications function, the semi-passive hyperfrequency with relatively high memory size far access away from Passive type hyperfrequency length access distance applications function from application function, for positioning, with the passive of relatively high memory size Formula hyperfrequency length access distance applications function, passive type hyperfrequency closely access distance applications function and held with relatively high internal memory The passive type hyperfrequency of amount closely accesses one of distance applications function, and
The specific high frequency access distance applications function is the short access distance applications function of high frequency, the height with relatively high memory size Frequently short access distance applications function, the passive type high frequency for gate inhibition's control and positioning short access distance applications function and had One of short access distance applications function of passive type high frequency of relatively high memory size;
In the establishment stage, the processing system according to the sub-information and the label sequence number and both Customs Assigned Numbers at least its One of, by setting the encryption key using certain operations, wherein:
The certain operations are one of the first computing, the second computing, the 3rd computing and the 4th computing,
First computing is total into first equal to the label sequence number, the Customs Assigned Number and the sub-information by the encrypted key setting With,
Second computing by the encrypted key setting into equal to the label sequence number and the second summation of the sub-information,
3rd computing is by the encrypted key setting into equal to the result obtained from arithmetical operation, and the arithmetical operation is applied to The sub-information and the label sequence number and both Customs Assigned Numbers at least one, and
4th computing captures certain number of position from one selected in first summation, second summation and the result, with Binary value is produced, and by the encrypted key setting into equal to the binary value;And
The processing system is radio RF identification label Item Processing System.
6. processing system as claimed in claim 2, wherein:
The tag memory more store be contained within this using in coding information can measurement parameters information, wherein this can measurement parameters Packet is containing use time, distance, weight, flow, cash card remaining sum, the boarding station numbering of popular traffic and flight path At least one of landing field numbering;
The application specific functionality is the toll management function, and by using this can measurement parameters information and be performed;
The processing system by performing the application specific functionality, by this can measurement parameters information be converted into toll amount to hand over Easily, and according to the transaction produce the trading message trading message is sent into the specific external device (ED);
The processing system more provides system messages, and the trading message is more generated according to the system messages;
In the establishment stage, the processing system sets this according to the label sequence number, second password shielding and the Hash table Mesh destroys password and the project accesses to your password;
The label sequence number has binary value, and the binary value has M position, wherein M>1;
The project destroys password and the project accesses to your password and is set in one of first state and the second state, its In:
When the project, which destroys password and the project to access to your password, to be set in the first state:
The processing system is shielded according to second password, and certain bits are selected from the binary value to produce the first value;
The processing system encodes first value to produce the first control signal;
When the first control signal represents odd number, the processing system performs the first encryption according to the Hash table and the odd number and transported Calculate, accessed to your password value with producing the first destruction password value and first, and the project destroyed into password and the project access to your password and set Determine into the respectively equal to first destruction password value and this first accesses to your password value;And
When the first control signal represents even number, the processing system performs the second encryption according to the Hash table and the even number and transported Calculate, accessed to your password value with producing the second destruction password value and second, and the project destroyed into password and the project access to your password and set Determine into the respectively equal to second destruction password value and this second accesses to your password value;And
When the project, which destroys password and the project to access to your password, to be set in second state:
The processing system is shielded according to second password, selects N number of position to produce second value, wherein N from the M position>1;
The processing system encodes the second value to produce the second control signal;
The processing system performs the 3rd cryptographic calculation according to the Hash table and the second control signal, close to produce the 3rd destruction Code value and the 3rd accesses to your password value;And
Are destroyed into password by the project for the processing system and the project accesses to your password and is set to the respectively equal to the 3rd destruction password value Accessed to your password value with the 3rd.
7. a kind of electronic tag to be authenticated in authentication phase, comprising:
Tag memory, storage encryption key and first information table, wherein:
The first information table has information table length value, and after the authentication phase, by using the information table length value It is read;And
The encryption key is to be derived from the information table length value, and is decrypted in the authentication phase with the certification electronic tag.
8. electronic tag as claimed in claim 7, wherein:
The electronic tag has user;
The tag memory stored tag identifier and Project Information Table;
The label identifier is numbered comprising label sequence number and manufacturer;
The Project Information Table is destroyed password, project and accessed to your password and particular portion comprising the first information table, the second information table, project Point;
Second information table includes the first authentication information, the encryption key and the first other information;
First authentication information includes project code, Customs Assigned Number and project deadline;
The encryption key includes sub-information;
First other information includes bullets and Protocol Control Information;
The first information table includes more than first information unit with the first total information unit numbers, wherein the information table length Value is equal to the first total information unit numbers;
More than first information unit receives news in brief number and the second other information comprising the second authentication information, first, and according to First order is sequentially arranged;
Second other information includes startup control table;
The specific part of the Project Information Table, which has, applies coding information;
The sub-information represents the information table length value;
The first reception news in brief number is by the processing system that is communicated with the electronic tag using to be linked to the specific external device (ED);
The electronic tag is applied to application specific functionality, wherein the application specific functionality by using this using coding information It is performed;
The project code is related to the application specific functionality;And
After the authentication phase, this is used to produce the trading message for the application specific functionality using coding information, And the first reception news in brief number is used for the trading message being sent to the specific external device (ED).
9. electronic tag as claimed in claim 8, wherein:
The first information table is set, the wherein the 3rd according to the label sequence number, first password shielding and the 3rd information table Information table includes more than second information unit with the second total information unit numbers, and the second total information unit numbers are equal to should First total information unit numbers, the information content of more than first information unit is same as the information of more than second information unit Content, and more than second information unit is arranged according to the second order order for being different from the first order order;
The encryption key be according to the sub-information and the label sequence number and both Customs Assigned Numbers at least one and set It is fixed;
The project, which is destroyed password and the project and accessed to your password, to be set according to the label sequence number, the shielding of the second password and Hash table It is fixed;
After the authentication phase, the first information table is according to the label sequence number, first password shielding and the first information Table and be converted into the 4th information table, wherein the 4th information table include the 3rd many information units, the 3rd many information lists Position is same as more than second information unit respectively, and the 3rd many information units are that basis is same as second order order The 3rd put in order and be arranged.
10. electronic tag as claimed in claim 8, wherein:
Second authentication information, which is included, is contained within this using the cash card remaining sum in coding information;
The application specific functionality is the cash consumption function, and is performed by using the cash card remaining sum;
Before the establishment stage, by default number is used, the first reception news in brief number is predetermined;
In the establishment stage, by the first user input is received, the first reception news in brief number is set;
By the application specific functionality is performed, the cash card remaining sum is updated to form cash card balance updates;
According to the cash card balance updates, the trading message is generated the trading message being sent to the specific external device (ED); And
Be certified into the electronic tag really to belong to the processing system after identical systems, the user it is desired should Time, inputted by the second user from the user is received, the first reception news in brief number is with the user desired second Receive news in brief number and substituted.
11. electronic tag as claimed in claim 8, wherein:
The electronic tag is radio RF identification label;
The processing system is radio RF identification label Item Processing System;
The startup control table includes multiple positions, and is contained within this using in coding information, and the plurality of position corresponds respectively to multiple Start signal;
The application specific functionality is gate inhibition's control function, and is performed by using the startup control table to control specific tube The electric equipment in gate inhibition area processed, the wherein specific control gate inhibition area are used for the user and the application dress that control has the electronic tag One of put;
The plurality of position includes certain bits, and the certain bits are used to control the specific startup signal in the plurality of startup signal, Wherein this it is specific start signal control the electric equipment with determine the user and the application apparatus wherein this one whether be allowed to Into the specific control gate inhibition area;
The certain bits represent one of licensing status and unauthorized state;
When the certain bits represent the licensing status, by the execution application specific functionality, the user and the application apparatus Wherein this one is allowed to enter the specific control gate inhibition area;
When the certain bits represent the unauthorized state, by the execution application specific functionality, the user and the application apparatus Wherein this one is prohibited from entering the specific control gate inhibition area;And
According to the certain bits, the trading message is generated the trading message being sent to the specific external device (ED).
12. a kind of be used to ensure the method for electronic tag, comprise the steps of:
The electronic tag is provided, the electronic tag is to be authenticated in authentication phase, and stores encryption key and first information table, Wherein the first information table has information table length value, and the encryption key is to be derived from the information table length value;
In the authentication phase, the encryption key is decrypted with the certification electronic tag;And
After the authentication phase, the first information table is read according to the information table length value.
13. method as claimed in claim 12, wherein:
The electronic tag includes tag memory, and with user;
The tag memory stored tag identifier and Project Information Table;
The label identifier is numbered comprising label sequence number and manufacturer;
The Project Information Table is destroyed password, project and accessed to your password and particular portion comprising the second information table, the first information table, project Point;
Second information table includes the first authentication information, the encryption key and the first other information;
First authentication information includes project code, Customs Assigned Number and project deadline;
The encryption key includes sub-information;
First other information includes bullets and Protocol Control Information;
The first information table includes more than first information unit with the first total information unit numbers, wherein the information table length Value is equal to the first total information unit numbers;
More than first information unit receives news in brief number and the second other information comprising the second authentication information, first, and according to First order is sequentially arranged;
The first reception news in brief number is to be used to be linked to specific external device (ED), and wherein the specific external device (ED) is action dress Put;
Second other information includes startup control table;
The specific part of the Project Information Table, which has, applies coding information, and comprising second authentication information and this is second other At least one of information;
This method further includes step:The 3rd information table and one group of system constants are provided, wherein this group system constants include computer Classification, system digits, certification classification, the information table length value, first password shielding, the shielding of the second password, Hash table and adjustment Table;
The sub-information represents the information table length value;
The electronic tag is applied to application specific functionality;
The application specific functionality comprising financial function, gate inhibition's control function, cash consumption function, credit card function, face cabinet service Function, toll management function, communication function, logistics function, production management function, work attendance management function, authentication function, business Product peddle management function, Car park payment function, supply chain function, project level tracking function, asset management functions, and combinations thereof At least one;And
This method further includes the following steps:
In establishment stage, the Project Information Table is set up, and the Project Information Table is written to the electronic tag;
The application specific functionality is performed by using the project code;
In authentication phase after this setup stage, the certification electronic tag;
After the authentication phase, the trading message for the application specific functionality is produced using coding information according to this;With And
The trading message is sent to by the specific external device (ED) according to the first reception news in brief number.
14. method as claimed in claim 13, wherein:
3rd information table is raw information table, and comprising more than second information unit with the second total information unit numbers, Wherein the second total information unit numbers are equal to the first total information unit numbers, the information content of more than second information unit The information content of more than first information unit is same as, and more than second information unit is according to different from the first order The second order of order is sequentially arranged;
The step for setting up the Project Information Table includes sub-step:According to the label sequence number, first password shielding and the 3rd Information table sets the first information table;
The label sequence number has binary value, and the binary value has M position, wherein M>1;
The sub-step for setting up the first information table includes substep:
Shielded according to the first password, select N number of position to produce the first value, wherein N from the M position>1;
First value is encoded to produce control signal;And
According to the adjustment table, the 3rd information table and the control signal, the second row is adjusted by arrangement adjustment computing is performed Row order is to produce the first information table;And
This method further includes the following steps:
In the authentication phase, authentication algorithm is performed with the certification electronic tag, wherein performing the step bag of the authentication algorithm Containing substep:
Read second information table of the electronic tag;And
By the encryption key decryption to determine that the sub-information indicates whether the information table length value;
When the sub-information represents the information table length value, confirm that the authentication algorithm passes through certification;
After the electronic tag is by the authentication algorithm, the first information table of the electronic tag is read;And
According to the label sequence number, first password shielding and the first information table, by perform inverse arrangement adjustment computing by this First information table is converted into the 4th information table;
4th information table includes the 3rd many information units, and the information content of wherein the 3rd many information units is same as this The information content of more than second information unit, and the 3rd many information units are according to being same as the of the second order order Three put in order and are arranged;And
The step that the first information table is converted into the 4th information table includes sub-step:According to the adjustment table, first letter Table and the control signal are ceased, performs the inverse arrangement adjustment computing to produce the 4th information table.
15. method as claimed in claim 13, wherein:
Second authentication information, which is further included, is contained within this using the cash card remaining sum in coding information;
The application specific functionality is the cash consumption function, and is performed by using the cash card remaining sum;
The step that the Project Information Table is set up in the establishment stage includes sub-step:Set by the first user input is received The fixed first reception news in brief number;And
This method further includes the following steps:
Before the establishment stage, by preset using default number this first receive news in brief number;
By the application specific functionality is performed, update the cash card remaining sum to form cash card balance updates;
According to the cash card balance updates, produce the trading message trading message is sent into the specific external device (ED);With And
After the electronic tag is certified into really, in the user desired time, by receive from the user the Two users input and substitute the first reception news in brief number with the desired second reception news in brief number of the user.
16. method as claimed in claim 13, wherein:
The electronic tag is radio RF identification label;
The startup control table includes multiple positions, and is contained within this using in coding information, and the plurality of position corresponds respectively to multiple Start signal;
The application specific functionality is gate inhibition's control function, and is performed by using the startup control table to control specific tube The electric equipment in gate inhibition area processed, the wherein specific control gate inhibition area are used for the user and the application dress that control has the electronic tag One of put;
The plurality of position includes certain bits, and the certain bits are used to control the specific startup signal in the plurality of startup signal, Wherein this it is specific start signal control the electric equipment with determine the user and the application apparatus wherein this one whether be allowed to Into the specific control gate inhibition area;
The certain bits represent one of licensing status and unauthorized state;And
This method further includes the following steps:
When the certain bits represent the licensing status, by the application specific functionality is performed, make the user and the application apparatus Wherein this one be allowed to enter the specific control gate inhibition area;
When the certain bits represent the unauthorized state, by the application specific functionality is performed, make the user and the application apparatus Wherein this one be prohibited from entering the specific control gate inhibition area;
According to the certain bits, produce the trading message trading message is sent into the specific external device (ED);
The step for setting up the Project Information Table includes sub-step:According to the predetermined radio frequency identification combined with the electronic tag Function, sets the project code, wherein:
The predetermined wireless radio-frequency discriminating function is comprising the financial function, the credit card function, this faces cabinet service function, the cash and disappear Take function, news in brief transmitting function, cash card remaining sum currency selection function, gate inhibition's control function, project level tracking function, the spy Determine at least one of hyperfrequency access distance applications function, specific high frequency access distance applications function and its combination,
The specific hyperfrequency access distance applications function is passive type hyperfrequency length access distance applications function, passive type hyperfrequency Short access distance applications function, the short access distance applications function of the passive type hyperfrequency with relatively high memory size, high frequency are short Access distance applications function, semi-passive hyperfrequency length access distance applications function, when the electronic tag move for positioning Semi-passive hyperfrequency far access distance applications function, the semi-passive hyperfrequency with relatively high memory size far access away from Passive type hyperfrequency length access distance applications function from application function, for positioning, with the passive of relatively high memory size Formula hyperfrequency length access distance applications function, passive type hyperfrequency closely access distance applications function and held with relatively high internal memory The passive type hyperfrequency of amount closely accesses one of distance applications function, and
The specific high frequency access distance applications function is the short access distance applications function of high frequency, the height with relatively high memory size Frequently short access distance applications function, the passive type high frequency for gate inhibition's control and positioning short access distance applications function and had One of short access distance applications function of passive type high frequency of relatively high memory size;And
The step for setting up the Project Information Table further includes sub-step:Compiled according to the sub-information and the label sequence number with the user Number the two at least one, by setting the encryption key using certain operations, wherein:
The certain operations are one of the first computing, the second computing, the 3rd computing and the 4th computing,
First computing is total into first equal to the label sequence number, the Customs Assigned Number and the sub-information by the encrypted key setting With,
Second computing by the encrypted key setting into equal to the label sequence number and the second summation of the sub-information,
3rd computing is by the encrypted key setting into equal to the result obtained from arithmetical operation, and the arithmetical operation is applied to The sub-information and the label sequence number and both Customs Assigned Numbers at least one, and
4th computing captures certain number of position from one selected in first summation, second summation and the result, with Binary value is produced, and by the encrypted key setting into equal to the binary value.
17. method as claimed in claim 13, wherein
The tag memory more store be contained within this using in coding information can measurement parameters information, wherein this can measurement parameters Packet is containing use time, distance, weight, flow, cash card remaining sum, the boarding station numbering of popular traffic and flight path At least one of landing field numbering;
The application specific functionality is the toll management function, and by using this can measurement parameters information and be performed;
This method further includes the following steps:
By performing the application specific functionality, by this can measurement parameters information be converted into toll amount to transact business;
According to the transaction, produce the trading message trading message is sent into the specific external device (ED);And
System messages are provided, the wherein trading message is more generated according to the system messages;And
The step for setting up the Project Information Table includes sub-step:According to the label sequence number, second password shielding and the Hash Table, sets project destruction password and the project accesses to your password, wherein:
The label sequence number has binary value, and the binary value has M position, wherein M>1;
Set the project destroy the sub-step that password and the project access to your password first state and the second state wherein it It is performed in one, wherein:
When the sub-step that setting project destruction password and the project access to your password is performed in the first state, if The sub-step that fixed project destruction password and the project access to your password includes substep:
Shielded according to second password, certain bits are selected from the binary value to produce the first value;
First value is encoded to produce the first control signal;
When the first control signal represents odd number, the first cryptographic calculation is performed according to the Hash table and the odd number, to produce First destruction password value and first accesses to your password value, and the project is destroyed into password and the project accessed to your password and be set to respectively etc. In the first destruction password value and this first access to your password value;And
When the first control signal represents even number, the second cryptographic calculation is performed according to the Hash table and the even number, to produce Second destruction password value and second accesses to your password value, and the project is destroyed into password and the project accessed to your password and be set to respectively etc. In the second destruction password value and this second access to your password value;And
When the sub-step that setting project destruction password and the project access to your password is performed in second state, if The sub-step that fixed project destruction password and the project access to your password includes substep:
Shielded according to second password, select N number of position to produce second value, wherein N from the M position>1;
The second value is encoded to produce the second control signal;
3rd cryptographic calculation is performed according to the Hash table and the second control signal, to produce the 3rd destruction password value and the 3rd Access to your password value;And
The project is destroyed into password and the project accesses to your password and is set to that the respectively equal to the 3rd destruction password value and the 3rd is deposited Take password value.
CN201710437312.2A 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag Active CN107133664B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
TW102105419 2013-02-08
TW102105419A TWI502525B (en) 2012-04-17 2013-02-08 Electronic tag and authentication system and method for securing electronic tag
CN201310728850.9A CN103984976B (en) 2013-02-08 2013-12-26 Method, device and system for using electronic tag

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201310728850.9A Division CN103984976B (en) 2013-02-08 2013-12-26 Method, device and system for using electronic tag

Publications (2)

Publication Number Publication Date
CN107133664A true CN107133664A (en) 2017-09-05
CN107133664B CN107133664B (en) 2020-06-05

Family

ID=51293374

Family Applications (5)

Application Number Title Priority Date Filing Date
CN201310728850.9A Active CN103984976B (en) 2013-02-08 2013-12-26 Method, device and system for using electronic tag
CN201710444961.5A Active CN107273775B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag
CN201710437311.8A Active CN107256355B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag
CN201710437735.4A Active CN107273774B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag
CN201710437312.2A Active CN107133664B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag

Family Applications Before (4)

Application Number Title Priority Date Filing Date
CN201310728850.9A Active CN103984976B (en) 2013-02-08 2013-12-26 Method, device and system for using electronic tag
CN201710444961.5A Active CN107273775B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag
CN201710437311.8A Active CN107256355B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag
CN201710437735.4A Active CN107273774B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag

Country Status (1)

Country Link
CN (5) CN103984976B (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9721237B2 (en) * 2011-06-24 2017-08-01 Paypal, Inc. Animated two-dimensional barcode checks
US11966907B2 (en) * 2014-10-25 2024-04-23 Yoongnet Inc. System and method for mobile cross-authentication
WO2016103373A1 (en) * 2014-12-24 2016-06-30 株式会社野村総合研究所 Settlement system and settlement method
CN104463286A (en) * 2014-12-30 2015-03-25 吴军明 Novel radio frequency identification tag manufacturing method
CN105354519B (en) * 2015-10-23 2019-03-15 福建优安米信息科技有限公司 A kind of processing data information system and its processing method
WO2017072951A1 (en) * 2015-10-30 2017-05-04 株式会社東芝 Battery control apparatus and battery system
CN106874987B (en) * 2017-03-22 2019-06-14 成都芯昊芯科技有限公司 A kind of passive tag chip operating mode configuration method
CN107749085A (en) * 2017-10-25 2018-03-02 北京匡恩网络科技有限责任公司 Ticket card, method and machinable medium using ticket card
CN108053154A (en) * 2017-11-30 2018-05-18 云南九方联达供应链管理科技有限公司 Supply-chain management system based on cloud platform
CN108269353B (en) * 2018-01-17 2021-04-30 北京网信云服信息科技有限公司 Self-service money exchange machine and self-service money exchange system
CN109399104A (en) * 2018-11-19 2019-03-01 吴建国 Housing system and its application method with wisdom interface
CN109766733B (en) * 2019-01-07 2021-05-18 武汉大学 Radio frequency tag monitoring method based on unique collision set
DE102019202247A1 (en) * 2019-02-19 2020-08-20 Siemens Aktiengesellschaft Procedure and arrangement for protecting a charging station from improper use
CN110381511B (en) * 2019-07-24 2020-11-20 深圳大学 Non-orthogonal multiple access authentication system based on shared physical layer authentication label
CN111737344B (en) * 2020-05-20 2023-08-25 时时同云科技(成都)有限责任公司 Data synchronization method and device for tag type weighing equipment
CN112345531B (en) * 2020-10-19 2024-04-09 国网安徽省电力有限公司电力科学研究院 Transformer fault detection method based on bionic robot fish
TWI786487B (en) * 2020-12-11 2022-12-11 振曜科技股份有限公司 Intelligent logistics labeling system and method for applying same
CN113343735B (en) * 2021-08-05 2021-11-05 深圳市成为信息技术有限公司 Tag processing method of reader-writer, reader-writer and storage medium
CN113705258B (en) * 2021-08-24 2023-05-16 电子科技大学 Method for exchanging data between reader and RFID tag
CN113657131B (en) * 2021-10-20 2022-02-11 深圳市成为信息技术有限公司 Label checking method of UHF handheld terminal and UHF handheld terminal
CN113722720B (en) * 2021-10-29 2022-02-18 苏州浪潮智能科技有限公司 System starting method and related device
CN114399862B (en) * 2021-12-16 2023-01-13 国家核安保技术中心 Gate passing control method and system based on temperature detection and gate inhibition authorization
CN114095911B (en) * 2022-01-20 2022-05-03 深圳维特智能科技有限公司 NFC (near field communication) bandwidth adjusting method and device based on wireless network router
CN115186854B (en) * 2022-09-07 2022-12-16 艾斯特国际安全技术(深圳)有限公司 Certificate acquisition control method, device and system and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1655161A (en) * 2005-03-07 2005-08-17 福建榕基软件开发有限公司 Business delivery certification system
CN101226600A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 Interactive electronic label, system method employed based on radio frequency recognition technique
CN101980273A (en) * 2010-11-04 2011-02-23 银川市高新电子应用技术研究所 Radio frequency identification technology-based commodity sales management system and method
CN102289768A (en) * 2011-08-24 2011-12-21 悦捷科技股份有限公司 Electronic transaction system
CN102855509A (en) * 2012-08-28 2013-01-02 湖南爱瑞杰科技发展股份有限公司 Novel motor vehicle driving license and management system thereof
CN102867344A (en) * 2012-09-07 2013-01-09 湖南爱瑞杰科技发展股份有限公司 Internet of Things entrance guard checking-in system and device
CN102916956A (en) * 2012-10-15 2013-02-06 北京理工大学 Hash function based RFID (Radio Frequency IDentification) mutual authentication method

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3335987B2 (en) * 1998-07-22 2002-10-21 日本電信電話株式会社 Non-contact IC card reader
AUPQ777200A0 (en) * 2000-05-26 2000-06-22 Embridge Lake Pty Ltd Control system
JP2004200829A (en) * 2002-12-17 2004-07-15 Furukawa Electric Co Ltd:The Rf id tag
CN1696986A (en) * 2004-05-11 2005-11-16 张金生 Anti-theft device of using wireless networked early warming
US20080129037A1 (en) * 2006-12-01 2008-06-05 Prime Technology Llc Tagging items with a security feature
US20080244714A1 (en) * 2007-03-27 2008-10-02 Michael Kulakowski Secure RFID authentication system using non-trusted communications agents
CN101440675A (en) * 2007-11-20 2009-05-27 长盛科技股份有限公司 Gate inhibition control method and system thereof
US10579995B2 (en) * 2010-03-30 2020-03-03 Visa International Service Association Event access with data field encryption for validation and access control
CN101908176A (en) * 2010-08-02 2010-12-08 国电南瑞科技股份有限公司 Method for modeling on basis of power information data and applying metadata management
TW201227556A (en) * 2010-12-24 2012-07-01 Chunghwa Telecom Co Ltd Electronic transaction system and payment method using telecommunication phone number as account number
CN102176718A (en) * 2010-12-28 2011-09-07 山东大学 Campus card based electrical and electronic experimental center comprehensive management system
CN102750558A (en) * 2011-04-20 2012-10-24 张默 Implementation method of multifunctional intelligent electronic label management system based on cloud computation
CN102298753A (en) * 2011-08-02 2011-12-28 悦捷科技股份有限公司 Anti-counterfeiting system for product
CN102509238A (en) * 2011-11-29 2012-06-20 成都安朗电气自控设备有限公司 Bank non-cash business processing method, apparatus and system
CN102880887B (en) * 2012-08-07 2015-12-16 深圳市金之彩文化创意有限公司 There is product information read method and the system of the alcohol product of metal external packing box

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1655161A (en) * 2005-03-07 2005-08-17 福建榕基软件开发有限公司 Business delivery certification system
CN101226600A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 Interactive electronic label, system method employed based on radio frequency recognition technique
CN101980273A (en) * 2010-11-04 2011-02-23 银川市高新电子应用技术研究所 Radio frequency identification technology-based commodity sales management system and method
CN102289768A (en) * 2011-08-24 2011-12-21 悦捷科技股份有限公司 Electronic transaction system
CN102855509A (en) * 2012-08-28 2013-01-02 湖南爱瑞杰科技发展股份有限公司 Novel motor vehicle driving license and management system thereof
CN102867344A (en) * 2012-09-07 2013-01-09 湖南爱瑞杰科技发展股份有限公司 Internet of Things entrance guard checking-in system and device
CN102916956A (en) * 2012-10-15 2013-02-06 北京理工大学 Hash function based RFID (Radio Frequency IDentification) mutual authentication method

Also Published As

Publication number Publication date
CN107133664B (en) 2020-06-05
CN107256355A (en) 2017-10-17
CN107273775A (en) 2017-10-20
CN103984976B (en) 2017-06-30
CN107273774B (en) 2020-12-01
CN103984976A (en) 2014-08-13
CN107256355B (en) 2020-10-16
CN107273774A (en) 2017-10-20
CN107273775B (en) 2020-06-05

Similar Documents

Publication Publication Date Title
CN103984976B (en) Method, device and system for using electronic tag
TWI587226B (en) Electronic tag and processing system and method for securing electronic tag
US11087316B2 (en) Electronic tag and system and method for securing electronic tag
US20210350197A1 (en) Electronic tag and system and method for securing electronic tag
US8025223B2 (en) System and method for mass transit merchant payment
US6764001B1 (en) Electronic money system and transaction method using the same
WO2002101181A1 (en) Home delivery box and home delivery baggage collecting/ delivering system and method therefor
CA2978920A1 (en) Digital token system for physical medium digitalization and physical store optimization
CN104182813A (en) Media Management
JP2002512711A (en) Transaction method with portable identification element
CN101373547A (en) Electronic wallet device and method of using electronic value
CN101002217A (en) Pharmaceutical product tracking
US20130103528A1 (en) Methods for using a shopping bag of reusable type with identification of digital type
CN106780990A (en) The self-service recovery picking all-in-one of portable product
CN102129650A (en) Network finance
US20020063157A1 (en) Auto settlement system using locker
CN107169719A (en) Encrypt express waybill and express delivery automatic access system
CN103886453A (en) Confirmation payment system using human body biological characteristics, and corresponding method
CN105354518B (en) Virtual chip card system based on mobile intelligent terminal soft excitation electromagnetic near field mutual inductance
CN206931112U (en) Encrypt express waybill and express delivery automatic access system
JP2874341B2 (en) Money transfer system
JP4340059B2 (en) Delivery box unit and delivery service collection system
KR20170124472A (en) System and method for delivery service
CN107798735A (en) A kind of BRT bus rapid transits automatic ticket-selling system
JP2007084273A (en) Home delivery service providing method using ic card compatible locker

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1243806

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant