CN107133664B - Electronic tag and processing system and method for ensuring electronic tag - Google Patents

Electronic tag and processing system and method for ensuring electronic tag Download PDF

Info

Publication number
CN107133664B
CN107133664B CN201710437312.2A CN201710437312A CN107133664B CN 107133664 B CN107133664 B CN 107133664B CN 201710437312 A CN201710437312 A CN 201710437312A CN 107133664 B CN107133664 B CN 107133664B
Authority
CN
China
Prior art keywords
information
tag
information table
item
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710437312.2A
Other languages
Chinese (zh)
Other versions
CN107133664A (en
Inventor
周东海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TAIWAN DEVELOPMENT & CONSTRUCTION Co
Original Assignee
TAIWAN DEVELOPMENT & CONSTRUCTION Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from TW102105419A external-priority patent/TWI502525B/en
Application filed by TAIWAN DEVELOPMENT & CONSTRUCTION Co filed Critical TAIWAN DEVELOPMENT & CONSTRUCTION Co
Publication of CN107133664A publication Critical patent/CN107133664A/en
Application granted granted Critical
Publication of CN107133664B publication Critical patent/CN107133664B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10366Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07758Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Abstract

The present disclosure relates to an electronic tag and a processing system and method for securing the electronic tag. A method for an RFID-tagged item processing system to authenticate an electronic tag, the electronic tag including a tag identifier and a tag memory, the method comprising: and establishing an item information table containing a first information table and a second information table on the electronic tag, wherein the second information table contains second authentication information, a short message receiving number and second other information. And selecting and checking the electronic tags. The read first information table includes a first encryption key and an item expiration date. The number of blocks of the first information table and the item deadline are checked. Reading the tag identifier includes a tag serial number. The first encryption key is decrypted to obtain the second sub-information. And checking the second sub-information to authenticate the authenticity of the electronic label. The second information table is read. The second information table with the original arrangement is obtained through an inverse adjustment operation. Authenticating the second authentication information to use the second other information and transmitting the short message to the received short message number.

Description

Electronic tag and processing system and method for ensuring electronic tag
The present application is a divisional application of chinese patent application No.201310728850.9 filed in 2013, 12, month, 26 and entitled "method for using in an electronic tag and apparatus and system therefor".
Technical Field
The present application relates to a method for using an RFID tag item processing system in an electronic tag and a device and a system using the same, and more particularly, to a method for authenticating a plurality of RFID tag item processing systems using a decryption encryption key and an authentication password, adjusting a parameter sequence, or a combination thereof, in an electronic tag, in which an item information table having encoding parameters is established in a plurality of authentication stages, and an electronic tag, and a device and a system using the same.
Background
A Radio Frequency Identification (RFID) system generally includes an RFID tag, an RFID reader, and a Computer (Computer) or a Controller (Controller). The electronic tag comprises an interposer (inlay) which comprises an Integrated Circuit (IC) and an antenna, for example, the function of the IC conforms to the communication interface specification of ISO18000-6C/EPC C1GEN2, ISO 18000-3M3, ISO 18000-3, etc., the antenna is arranged in the electronic tag through a special packaging technology, and the reader can communicate with the electronic tag and access data according to the specified command. The electronic tag comprises a tag identifier consisting of a manufacturer number and a unique tag serial number, and a memory space for storing data. The processing program of the computer first sets the communication method between the electronic tag and the reader, which includes the communication channel, the Session Number, the pulse width, the link frequency, the Modulation mode, the bit transmission speed, the antenna transmission power, and so on.
Although banks have established 140 tens of thousands of Automatic Teller Machines (ATMs) worldwide to provide 24 hours of financial services to users, hundreds of thousands of customers or users travel to various banks each day to transact financial transactions, which, in addition to having to be personally filled in withdrawal or deposit or transfer documents or being asked in front of bank tellers, such as deposit and withdrawal account numbers, and withdrawal or deposit or transfer amounts, are also required to provide stamps, certificates to identify the identity of the user, and to input a set of passwords for comparison by a bank computer system, and cash can be received after successful identification and password comparison, which are inconvenient for users, especially for elder generations with dull ears, and therefore, it is desirable to have some kind of electronic tag to store information required for the user to transact financial services, and to have some kind of authentication method to verify the authenticity of the electronic tag and to ensure system security, the use of the electronic label replaces the aforementioned disadvantages of manual filling.
At present, the RFID is applied to high frequency, and the financial card or credit card is combined with cash card consumption, and is widely used in daily life, such as payment for taking a bus, a railway, a high-speed rail, traveling or shopping, but for paying at a toll station in a parking lot or a highway, most vehicles are stopped and charged by toll collectors, so a new card and system are expected to be provided, which are not only combined with the RFID ultrahigh frequency long distance technology and the cash deduction function, and are installed on the vehicle to allow the vehicle to pay while driving to replace the manpower required for charging, but also are also applicable to the existing RFID high frequency short distance application.
Since the electronic tag includes applications in other industries besides the financial industry, such as asset management, door control, cash consumption, product record management, hospital medicine and nursing management, and item level tracking, if a method for verifying the authenticity of the electronic tag can be applied to the financial industry, the new method can be applied to other industries as long as the electronic tag is coded according to the industry type, and therefore, it is expected that the electronic tag can be coded according to the industry type, and the new method can be applied to various industries at the same time, for example, a device combining industries such as finance, cash card consumption, and door Access (Gate Access), can be used in a new ATM, and can be used for shopping in convenience stores, and can also be used for starting electric appliances in restricted areas.
In the patent document of us patent No. 6,130,623, there is a technology for electronic tags, readers, and exchanging information between them, where the electronic tags and the readers communicate with each other in an RFID manner through an antenna, and personal information in the electronic tags (for example, PIN codes in mobile phones) is easily intercepted and stolen, for example, a counterfeit reader is used to read the personal information in the electronic tags. Another situation is to communicate with the reader using a counterfeit tag and then steal the secret data stored by the application processor. Therefore, in order to solve the problem of leakage of the secret data, the patent document proposes an encryption method for the secret data. However, more efficient methods for protecting secret data and securing the system are still desired.
In the article of IEEE "a low cost UHF RFID Tag base and with an IDEA CryptographyEngine", the method of International Data Encryption Algorithm (IDEA) encryption is applied to the encryption of data in an electronic Tag, however, an encryption engine used in the method needs to add an integrated circuit between a reader and the electronic Tag, which not only requires complex operation, but also increases the cost of the system.
Disclosure of Invention
In view of the shortcomings and expectations of the prior art, the present invention proposes a method for improving and solving the above-mentioned problems, which employs the combination of RFID technology, encryption/decryption key, encoding, transmission of short message, and adjustment of parameter arrangement order, and establishes a new RFID tag and its device and an RFID tag item processing system to authenticate the RFID tag according to a plurality of authentication stages, and applies the system function of the present invention to various industries by using encoding, and transmits short message as a method for authenticating system security. Whenever a local computer communicates with an electronic tag via an RFID reader according to a communication interface specification command, the command and data are usually transmitted in frames (frames), and the frames may include time stamps, command codes and parameters, Protocol Control (PC) information, Unique Item Identifiers (UII), and CRC error codes. If the UII is used to contain multi-purpose and multi-functional item authentication information, such as a deposit account number, a deposit password, a credit card number, a temporary service password (temporary password, credit card password, the number of comparison failures, the balance information of a cash card, and an encryption key, etc., these information will have an unequal number of words from 10 to 44, and some information in different electronic tags need not be arranged in a fixed order, so it is almost impossible for someone to eavesdrop the individual password information from the frame data, because if the frame contains multiple sets of parameter information, it is equal to installing a protection mechanism between the parameters, so the communication connection between the RFID reader and the electronic tag becomes safer, and instead, the place where protection and protection must be strengthened is in checking the authenticity of the electronic tag.
In view of simplifying the operation mode that the current user needs to fill in documents when coming to a bank to transact deposit, withdrawal or transfer business, the application provides a method for establishing an item information table for a radio frequency identification processing system. When the user comes to a bank, the bank teller executes an RFID label item processing system program on a local computer and reads an item information table in the electronic label through the RFID reader as long as the electronic label is placed on the RFID reader of the bank teller without filling in deposit or withdrawal or transfer bills, the bank teller can firstly request the user to show a certificate for identifying the identity of the user before using withdrawal account information in the item information table, and can also firstly request the user to input a temporary cabinet password for comparison through a numeric keyboard during withdrawal. After the password is successfully authenticated, the party proceeds with a subsequent operation procedure, which includes the cash dump into the electronic tag. When the item information table contains, for example, a deposit and withdrawal code or a credit card code, the electronic tag can be used on a new ATM. When the item information table contains cash card balance information such as cash card balance, cash card store classification, cash card commodity number, cash card use state, cash card bus station number and the like, the cash card balance of the electronic tag can be deducted or stored in the store. The electronic tag can also be combined with an ultrahigh frequency long-distance communication antenna to manufacture a certain device, and a project information table as described above is established in the electronic tag, for example, the functions of a financial card number (or a deposit and withdrawal account number) and a cash card or a credit card number and a cash card are combined, then the electronic tag is hung in a vehicle or is arranged in an insertion slot attached to the vehicle, so that the electronic tag faces to the driving direction of the vehicle and is fixed in the insertion slot which can be rotated left and right or adjusted upwards, and the vehicle can pay in a cash deduction mode during the driving of a highway or a parking lot. When the item information table is combined with a function of enabling the cash card balance to selectively store certain currency, the user can use the electronic tag to store purchased foreign currency in a bank, if the function of selectively storing certain currency can also be used in shops of other countries, when the user is consuming, if the currency used by the consumption amount selected by the shop is different from the currency type stored in the electronic tag held by the user, the consumption amount of the user can be exchanged into the currency type which is the same as the cash card balance by only obtaining the currency exchange rate through a network connection to a financial center database so as to perform authentication and cash deduction or value storage of the electronic tag, and the electronic tag can be used as cash globally.
Since the project information table contains multi-purpose and multi-functional project information, it is necessary to enhance the authentication of the authenticity of the electronic tag, so the present application proposes a plurality of authentication methods for an RFID tag project processing system, which includes a method of authenticating the authenticity of the electronic tag and confirming that the electronic tag belongs to the same system and a method of authenticating a user's temporary counter password. The method for authenticating the authenticity of the electronic label comprises the steps of establishing an item information table with coding parameters in the electronic label, adding an item code, an item number, a user number and an encryption key into the item information table, wherein the encryption key and the user number are used for authenticating the authenticity of the electronic label and confirming the authenticity of the electronic label to belong to the same system, the processing system selects the electronic label according to the item code of the electronic label, the efficiency of the processing system can be increased, other item information can be prevented from being leaked before authentication, and the authenticity of the electronic label can be identified and the authenticity of the electronic label can be confirmed to belong to the same system by decrypting the encryption key. In addition, in order to increase the anti-eavesdrop mechanism for the project information table, the plural authentication method further proposes to divide the project information table stored in the electronic tag memory space into a first memory block information table, a second memory block information table and a third memory block information table according to plural authentication stages, wherein the first memory block information table only contains project information required by a first authentication stage, such as project codes, project numbers, user numbers and encryption keys, wherein the encryption keys are generated by the tag serial number, the user number and the length value of the second memory block information table, the user number is a number or a system code number in sequence from 1, and other project information used in the second authentication stage, such as deposit and withdrawal account number, deposit and withdrawal password, temporary cabinet password and cash card balance information, is stored in the second memory block information table, the encryption key is decrypted to obtain the length value of the second memory block information table, and the length value of the second memory block information table is checked to confirm that the second memory block information table belongs to the same system, and then the second memory block information table is read, and other item information used after the authentication in the second authentication stage is successful, such as a user account number required by the processing system, is stored in a third memory block information table, which is used for increasing the security and anti-eavesdropping mechanism of the item information table. The said multiple authentication method is that an encrypted link key is added in the second memory block information table, and the link key contains a third memory block information table length value, the link key is decrypted and the third memory block information table length value is obtained to read the third memory block information table, the second memory block information table can choose not to add an encrypted link key but to add a receiving short message number in different industries and systems, when the item information table using the electronic label is finished, the processing system will transmit the short message composed of transaction time, place and transaction summary to the receiving short message number, also giving another way for user to confirm using the electronic label. Since a single cryptographic message is never transmitted at each authentication stage, the multiple authentication method provides the most cost-effective way of communication for anti-counterfeiting, anti-eavesdropping, and security.
When the bank teller executes the RFID tag item processing system program and selects the item code of the electronic tag according to the selection instruction through the reader so as to read the item information table in the electronic tag, the electronic tag only transmits the first memory block information table of the electronic tag back to the processing system, and the first memory block information table comprises the item code, the user number, the encryption key and the like as first memory block authentication information and comprises the item number, PC information with a starting value, CRC16 error detection code and the like as other information of the first memory block. The processing system reads the label identifier of the electronic label through the reader according to the method for authenticating the authenticity of the electronic label, and then the authenticity of the electronic label can be authenticated and the electronic label belongs to the same system, and the length value of a second memory block information table in the electronic label, namely the number of words, is obtained, so as to finish the authentication of the first stage. The method for authenticating the user's temporary cabinet password comprises the steps that the processing system firstly requires the user to input an authentication password by a numeric keyboard, after the processing system successfully decrypts the encryption key, the processing system reads a second memory block information table in the electronic tag by a reader, the second memory block information table comprises a deposit withdrawal account number, a temporary cabinet password, an encrypted connection key and the like as second memory block authentication information and other information comprising a deposit withdrawal password, the comparison failure times and cash card balance information as second memory block, the processing system compares whether the authentication password which is input by the user in advance is consistent with the temporary cabinet password read by the electronic tag or not, after the password comparison is successful, the processing system establishes connection with a bank database through a network, takes the deposit withdrawal account number as an index, obtains the user data and displays the user data on a display, such as an identity identifier, a house name, a user name, a password and the like of the user, The information of birthday, address, telephone number, electronic mail box and occupation, etc. can be compared by the bank teller to determine whether the identity card presented by the user is consistent with the data displayed by the display. After the user identification authentication is successful, the authentication of the second stage is completed, and then the bank teller can use the deposit and withdrawal account number to perform subsequent operation procedures, so that the user does not need to fill in the bill of withdrawal, deposit or transfer. If the user uses a new ATM to make transaction, the said multiple authentication method also includes the steps of selecting an authentication category and inputting an authentication password by the user, selecting a group of passwords from the second memory block authentication information by the processing system as authentication information, then comparing the input authentication password with the selected authentication information, decrypting the encrypted connection key after the password comparison is successful, and obtaining the length value of the third memory block information table, i.e. the number of character groups.
When a user uses a new ATM, the tag item processing system is divided into deposit and withdrawal, credit transaction and cash value-stored transaction, if the deposit and withdrawal transaction is carried out, the user inputs a deposit and withdrawal password of the user through a digital keyboard, if the credit transaction is carried out, the user inputs a credit card password of the user, and if the cash value-stored transaction is carried out, the user inputs a cash card password of the user. When the user is using cash card or storing value, although it is not necessary to compare the authentication information according to the current cash card consumption mode, in order to prevent the cash card or the high-volume pre-borrowed cash credit card from being lost or stolen and swiped, according to the plural authentication methods provided by the present application, it only needs to use the temporary cabinet password of the second memory block of the electronic tag as the cash card password or add a cash card password into the second memory block, and the tag item processing system requires to input a cash card password, and after passing the cash card password authentication, the user must perform cash card deduction transaction, so that the financial card can be prevented from being stolen and swiped.
Besides the financial industry, the method for authenticating the authenticity of the electronic tag can be applied to industries such as asset management, entrance guard, cash consumption, transnational production history management, transnational product tracking management and the like. Therefore, the present application proposes a method for authenticating the authenticity of an electronic tag in the financial industry, which can be combined with other industries, or applied to industries other than the financial industry and even across countries, by defining the categories of industry, enabling function, device, function, and country of implementation in a parameter such as an item code, and storing the item code in an item information table of the electronic tag. For example, a RFID asset management system sets up a comparison authentication message, and after the comparison authentication message is successful, the access right to the asset management system for querying and modifying asset records can be obtained. Thus, the asset management system can select the electronic tag according to the item code when the electronic tag is selected by the reader, and the asset management system becomes more efficient, so that the electronic tag is expected to have the item codes of the category codes of industry, starting function, device, function, country and the like, so as to improve the processing efficiency of the whole RFID item processing system and extend the application range of the method for authenticating the authenticity of the electronic tag. For example, in an RFID entrance guard control system, the item information table for establishing an electronic tag includes, for example, an RFID passage control table, each bit in the RFID passage control table can correspond to the authorized passage and use of a restricted entrance zone, the restricted entrance zone includes a check whistle or parking lot with a fence, an office zone or building or fitness center with an electronic lock door, and a house or a residential area or building with an electric rolling door, when the electronic tag is used to pass an entrance guard zone, the method for comparing safety is to authenticate the authenticity of the electronic tag and then to check the setting of the restricted entrance zone corresponding to one bit in the RFID passage control table, if the setting of the bit is 1, the electric appliance equipment of the restricted entrance zone can be started, which includes starting the fence, rolling door, warning light, alarm, electronic door lock, electric appliance, electric door lock, door, If the bit is set to 0, indicating unauthorized access and entering the area, the warning electrical equipment in the restricted area can be started, including starting the warning lamp, alarm, or sending warning message.
In view of the above, the present application provides a method for an RFID Tag Item processing system to establish an Item information table in an electronic Tag Memory, the electronic Tag having Tag Identifier (TID), Reserved Memory (RM) space, Unique Item Identifier (UII) space, and User Memory (UM) space, the Tag Identifier comprising a Tag Serial Number (Tag Serial Number) and a manufacturer Serial Number (manufacturer identity), and the method for establishing the Item information table comprises establishing an Item password and an Item access password in the RM space, and further comprises dividing the UII space into a first Memory block information table and a second Memory block information table, the UM space being a third Memory block information table, and establishing a first encryption block authentication information and a first encryption key in the first Memory block information table, And first other information, wherein the first authentication information includes an item code and a user number, the user number is a system constant value or a system code number, the first other information includes an item number and first PC information, and the first PC information is provided with an initial value. And establishing second authentication information and second other information in the second memory block information table, wherein the second authentication information comprises a deposit and withdrawal password, a credit card password, a temporary counter service password and a cash card balance, and the second other information comprises a deposit and withdrawal account number, a comparison failure frequency, a cash card balance currency, a cash card store code, a cash card commodity number, a cash card use state and a cash card bus station number. And establishing a third information table in the third memory block information table, wherein the third information table comprises an account transfer table, an RFID traffic control table, a received short message number table, or a combination thereof.
In accordance with the above mentioned idea, another aspect of the present invention provides a method for using a plurality of authentications by an RFID tag item processing system when authenticating an electronic tag, the electronic tag having a tag identifier and a tag memory, the tag memory being divided into a reserved memory block, a unique item identifier memory block, a first memory block, a second memory block, and a third memory block, the reserved memory block storing an item destruction password and an item access password, the first memory block storing a first information table, the second memory block storing a second information table, and the third memory block storing a third information table, the method comprising the steps of: and selecting and checking the electronic tag according to the item code of the electronic tag. Reading a first information table, wherein the first information table comprises first authentication information, a first encryption key and first other information, the first authentication information comprises item codes and user numbers, the first other information comprises item numbers and first PC information, the first PC information indicates a first information table length value, namely a word group number, the first encryption key comprises encrypted second sub information, and the second sub information is a second information table length value. The user is required to provide an identification document. The user is required to enter an authentication password in the numeric keypad. The tag identifier is read. The first encryption key is decrypted to obtain the second sub-information. The second sub-message is checked to verify that Makoto of the electronic tag is counterfeit and belongs to the same system. Reading a second information table, wherein the second information table comprises second authentication information, a second encryption key and second other information, the second authentication information comprises a deposit and withdrawal password, a temporary cabinet password and the number of comparison failures, the second other information comprises a deposit and withdrawal account and cash card balance information, and the cash card balance information comprises cash card balance currency, cash card balance, cash card use state and cash card bus station number. The tag item processing system can use the deposit and withdrawal account to obtain a user authentication information from the database, wherein the user authentication information includes the identity identifier, the name, the birthday, the telephone number, the e-mail box and the address of the user for comparing the identity of the user. And comparing the authentication password with the authentication information. After the identity identification and the password comparison are successful, the operation procedure of drawing money or depositing money can be performed by using the deposit and withdrawal account. The second encryption key is decrypted to obtain a third information table length value, i.e. the number of words. Reading the third information table according to the number of words of the third information table, wherein the third information table comprises an account transfer number table, an RFID traffic control table, a received short message number table, or a combination thereof. The tag item processing system can use the deposit and withdrawal account number and the transfer account number table to withdraw and transfer money, or transfer the withdrawal money to the cash card balance of the electronic tag according to the cash card balance currency and record the transaction, or transmit the short message composed of the transaction time, place and transaction summary to a receiving short message number.
Drawings
The invention will be understood in more detail from the following description, given by way of example and understood in conjunction with the accompanying drawings, in which:
FIG. 1: a schematic diagram of a radio frequency identification information system 1 according to a first preferred embodiment of the present application;
FIG. 2: a schematic diagram of an electronic tag 3 according to a second preferred embodiment of the present application;
FIG. 3: in the third preferred embodiment of the present application, a parameter configuration diagram of a project information table 33 is established by a financial credit cash authentication card (not shown) according to the tag memory address;
FIG. 4: the third preferred embodiment of the present application establishes a schematic diagram of the third information table 3E0 in the user memory block 3E of the electronic tag 30 of a financial credit cash authentication card (not shown);
FIG. 5: a schematic diagram of the present application encrypting and decrypting a first encryption key 352;
FIG. 6: a schematic diagram of the present application encrypting and decrypting a second encryption key 370;
FIG. 7: in the present application, a schematic method diagram of an item destruction password 3B1 and an item access password 3B2 is established in the reserved memory block 3B;
FIG. 8: the method for establishing the second information table 39 in the UII memory block to enable the UII memory block to have different arrangement sequences is schematically shown;
FIG. 9: the present application is a schematic illustration of a method for a RFID tag item processing system 22 to use in a RFID information system to establish an item information table 33 for a user in an electronic tag 3;
FIG. 10: a schematic diagram of a method for using an RFID tag item processing system in a wireless RFID information system to authenticate an electronic tag 3 using encryption keys and passwords according to a fourth preferred embodiment of the present invention;
FIG. 11: the RFID tag item processing system of the fifth preferred embodiment of the present application uses a time-varying representation of messages from a first phase of a plurality of authentication methods;
FIG. 12: the RFID tag item processing system uses a time-varying representation of the second phase of a plurality of authentication methods;
FIG. 13: the RFID tag item processing system 22 of the sixth preferred embodiment of the present application uses a time-varying message of a plurality of authentication methods for toll payment; and
FIG. 14: the seventh preferred embodiment of the present application is a schematic representation of an RFID tag item processing system 22 for use in a wireless RFID information system.
Detailed Description
The following detailed description is to be read with reference to the drawings, which are included to illustrate various embodiments of the invention and to provide an understanding of how the invention may be practiced. The embodiments of the present invention provide sufficient detail to enable those skilled in the art to practice the embodiments disclosed herein, or to practice embodiments derived from the disclosure. With respect to the description of the specific embodiments, those skilled in the art will understand the invention of the present application with reference to the following description and drawings.
Please refer to fig. 1, which is a schematic diagram of a radio frequency identification information system 1 according to the present application. The radio frequency identification information System 1 comprises a radio frequency identification authentication System 2, an electronic tag 3, a network connection device 5, an internet 6, and a wireless mobile network device 7, wherein the radio frequency identification authentication System 2 comprises an RFID tag item Processing System (RFID TIPS)22, a network connection 21, another Processing System 24, and a network connection 23, the wireless mobile network device 7 comprises a mobile device using the wireless mobile network System, such as an authentication mobile phone or a display using GSM or GPRS, or a display having an IP address or a mobile device receiving a short message number via the internet to receive short messages, images, or short messages and images, and the mobile device comprises an intelligent authentication mobile phone, a display, or a server. The electronic tag 3 is a device that establishes an item information table in its tag memory. In one embodiment, the electronic tag 3 can establish communication and exchange information with a reader according to the ISO18000-6C communication interface. The electronic tag 3 has a tag identifier 31 and a tag memory 34, the tag memory 34 can be divided into memory sections and blocks, and includes a first memory block 36, a second memory block 38, a third memory block 3G, and a reserved memory block 3B, the second memory block 38 can include the first memory block 36, and the third memory block 3G can be a user memory block 3E. The electronic tag 3 further comprises an interface and communication control circuit 3K and an antenna 3J, the antenna 3J is connected to the interface and communication control circuit 3K, the interface and communication control circuit 3K is connected to the tag memory 34, and the electronic tag 3 can be a tag-attaching device made of the electronic tag memory 34, the interface and communication control circuit 3K and the antenna 3J, or a card or other shape device made of the electronic tag and an insulating packaging material with a certain thickness. The antenna 3J may be a uhf antenna for transmitting and receiving uhf signals, and the interface and communication control circuit 3K converts the uhf signals into tag processing instructions, such as a Select (Select) electronic tag, a Query (Query) electronic tag, an Access (Access) electronic tag, a Query report (QueryRep), a request new random code (Req _ RN), a Read (Read) tag memory, a store (Write) tag memory, and the like, in accordance with a frame mode specified by the uhf RFID communication interface. In a preferred embodiment, the antenna 3J may be a high frequency induction coil for transmitting and receiving high frequency signals, and the interface and communication control circuit 3K may convert the high frequency signals into tag processing commands, such as Select (Select) tags, check (BeginRound) tags, Access (Access) tags, check report (NextSlot), request new random code (Req _ RN), Read (Read) tag memory, store (Write) tag memory, etc., in a frame manner prescribed by the ISO 18000-3M3 high frequency RFID communication interface. In a preferred embodiment, the antenna 3J may have both an ultrahigh frequency antenna and a high frequency induction coil for transmitting and receiving an ultrahigh frequency signal or transmitting and receiving a high frequency signal, and the interface and communication control circuit 3K may select to convert the ultrahigh frequency signal into a tag processing command in a frame manner specified by the ultrahigh frequency RFID communication interface or to convert the high frequency signal into a tag processing command in a frame manner specified by the high frequency RFID communication interface. The tag memory 34 stores an item information table 33, and the item information table 33 includes a first information table 35, a second information table 37, and a third information table 3E 0. The first memory block 36 stores a first table of information 35, the first table of information 35 including first authentication information 350, a first encryption key 352, and first other information 354. The second memory block 38 stores the first information table 35 and also stores a second information table 37, the second information table 37 including second authentication information 371, a second encryption key 370, and second other information 372. The third memory block 3G stores the third information table 3E 0. In another preferred embodiment, the antenna 3J may be a high frequency induction coil for transmitting and receiving high frequency signals, and the interface and communication control circuit 3K may establish communication and mutual information with a reader according to the ISO 18000-3 communication interface specification, the electronic tag 3 has a tag identifier 31 and a tag memory 34, the tag memory 34 is divided into sections and blocks according to the memory, an item information table 33 may be established in the tag memory 34, the item information table 33 includes a first information table 35, a second information table 37 and a third information table 3E0, the first information table 35 includes first authentication information 350, a first encryption key 352 and first other information 354, the interface and communication control circuit 3K converts high frequency signals into tag processing instructions, such as selecting (identity) electronic tags, reading (Specific or Group) tag memory addresses and reading (address) according to the RFID communication interface specification, Store (Specific or Group Write) tag memory address, Lock (Lock) tag memory address, and the like.
In one embodiment, the tag item processing system 22 includes a reader 221, a local computer 222, a numeric keypad 223, and a display 225, the local computer 222 being connected to the reader 221 via reader connection 22D, to the numeric keypad 223 via keypad connection 22E, and to the display 225 via display connection 22F. In one embodiment, the local computer 222 is a computer, and in a preferred embodiment, the local computer 222 may be a personal computer, a microcontroller, a microcomputer, or a workstation. The reader 221 is connected to an antenna 224. In a preferred embodiment, the local computer 222 has a plurality of USB ports, and the reader connection 22D, the keypad connection 22E, and the display connection 22F all have USB connectors for connecting to the local computer 222. The tag item processing system 22 can access the user input password via the local computer 222, the numeric keypad connection 22E, and the numeric keypad 223. In a preferred embodiment, the numeric keypad 223 is an input keypad for inputting numbers and text. The label item processing system 22 visually transmits its output to the display 225, which may include a Liquid Crystal Display (LCD), or a transistor (LED) display, or printed from a Printer (Printer), via the local computer 222 and the display connection 22F. In a preferred embodiment, the tag item processing system 22 may also audibly send its output to a built-in Speaker (Microphone) of the local computer 222, or an external Speaker (Speaker), or activate an Alarm (Alarm). The reader 221 may be a reader for transmitting and receiving uhf RFID messages, and the reader 221 includes an interface and communication control circuit for converting tag processing commands of the reader 221 into uhf signals transmitted or received to and from the antenna 224 in a frame manner defined by the uhf RFID communication interface. In another preferred embodiment, the reader 221 is a reader for transmitting and receiving RFID high frequency or other frequency information, such as 433MHz, and the reader 221 includes an interface and communication control circuit for converting the tag processing command of the reader 221 into a high frequency or other frequency signal transmitted or received to or from the antenna 224 in a frame manner defined by the high frequency or other frequency RFID communication interface. In a preferred embodiment, the reader 221 may be combined with both of the above readers, and the reader 221 includes an interface and communication control circuit, which can selectively convert the tag processing command of the reader 221 into an uhf signal or an hf signal transmitted or received to or from the antenna 224 in a frame manner specified by an uhf RFID communication interface or an hf RFID communication interface. A radio frequency identification information channel 226 is formed between the antenna 224 and the antenna 3J. In one embodiment, the antenna 224 and the antenna 3J may be rfid uhf antennas, and the message channel 226 may be a lane several meters long (5 to 10 meters long distance) or an air channel several tens of meters long (100 meters long distance). In a preferred embodiment, the antenna 224 and antenna 3J may be rfid high frequency induction coils, and the information channel 226 is an insulating medium containing air and plastic within 1 to 2 or several centimeters (short distance of 5 to 10 cm or less). In a preferred embodiment, the antenna 224 and the antenna 3J can form a Radio Frequency Identification (RFID) UHF antenna and a high frequency induction coil at the same time to transmit and receive UHF signals or transmit and receive HF signals. The tag item processing system 22 can perform mutual data transmission and authentication procedures with the electronic tag 3 via the local computer 222, the reader connection 22D, the reader 221, and the rfid channel 226. In a preferred embodiment, the reader 221 and the antenna 224 may be configured in the same device having a platform formed by a plastic housing, which can carry the electronic tag 3. In a preferred embodiment, the network connection 21 connects the local computer 222 of the tag item processing system 22 with the network connection device 5, the tag item processing system 22 is connected with the internet 6 and the wireless mobile network device 7 through the network connection 21 and the network connection device 5, the local computer 222, the reader 221, the antenna 224, the display 225, and the numeric keypad 223 are all configured in the same device, for example, the device is an authenticated Automatic Teller Machine (atm), the atm uses a card insertion slot for inserting the electronic tag 3, and the atm can also use a closed platform for carrying the electronic tag 3. In another preferred embodiment, the tag item processing system 22 can read the tag serial number of the electronic tag 3 through the local computer 222 and the reader 221 to be visually outputted to a bar code machine (Label Printer) and printed on the sticker, and then attach the sticker to an item of product, such as a piece of clothing, or a packing box, a packing bag, or a pallet containing the product, for an RFID production certification system to make inventory management and inventory check, or an RFID security certification system to perform anti-theft check. In a preferred embodiment, the network connection 21 can be a wireless network channel, the tag item processing System 22 is connected with the internet 6 and the wireless mobile network device 7 through the network connection 21 and the network connection device 5 in a wireless manner, the local computer 222, the reader 221, the antenna 224, the display 225 and the numeric keypad 223 are configured in the same device to form a wireless device, the wireless device is an RFID authentication reader, so that the tag item processing System 22 can be used by a salesperson to read the electronic tag 3 fixed on a station, a road sign or a patrol point of an attendance route during attendance, and the short message composed of the information about the station, the road sign or the patrol point in the electronic tag 3 and the attendance route and Time is transmitted to an RFID attendance authentication System, which is used as an RFID attendance information System to establish an RFID Real-Time authentication location System (Real-Time authentication location System, RTALS). In another preferred embodiment, the wireless device has a hand-held grip or holder formed by a plastic housing, and the wireless device is a hand-held RFID reader for a shop to use an RFID merchandise authentication system to read the electronic tag 3 attached to an article of merchandise and to query the merchandise data through the tag item processing system 22. In another preferred embodiment, the tag item processing system 22 may be connected via the local computer 222 to other USB-ported devices and USB-connected lines for inputting consumption information including time, distance, weight, liquid flow, bar code, or geographic location latitude and longitude, including an electronic scale, a bar code scanner, a liquid flow meter, a drinking water flow meter, or a global geographic coordinate locator, and then convert the consumption information into a consumption amount for payment using the cash card of the present invention.
In one embodiment, the rfid authentication system 2 further comprises one or more other processing systems 24, a network connection 23 connecting the other processing systems 24 and the network connection device 5, the other processing systems 24 being connected to the internet 6 and the wireless mobile network device 7 through the network connection 23 and the network connection device 5. In a preferred embodiment, the network connection 23 can also be a wireless radio frequency network channel, and the other processing system 24 can be wirelessly connected with the internet 6 and the wireless mobile network device 7 through the network connection 23 and the network connection device 5. The other processing system 24 may be the same as the processing system 24 of the tag item processing system 22, and includes a local computer 222, a reader 221, an antenna 224, a display 225, and a numeric keypad 223, which can be Used as a Network Financial authentication device (nuFAD), wherein the reader 221 has a platform for carrying the electronic tag 3. In a preferred embodiment, the other processing system 24 may also include processing systems of other devices including readers, electronic scales, bar code scanners, drinking water flow meters, or global geo-coordinate locators. In another preferred embodiment, the other processing System 24 may only include a Local computer 222, a display 225, and a numeric keypad 223, which are used AS a header pipe (ASM) or an authentication Kiosk (ASK) for displaying queries, or a Local Database (LDB) of the rfid authentication System 2, and may also be used AS an Authentication Server (AS), such AS a printer Server, a mail Server, etc. The TIPS, LDB, and ASM in the RFID authentication system 2 are provided with names, codes, numbers, or IP addresses for identification. The local computer 222 uses resources on the network after starting its operating system, and for system security, it may use a login user and an interface for inputting a user password to manage the users accessing the network. The RFID information system 1 further includes a database 4. The network connection device 5 is connected to the network connection 21 to connect a tag item processing system 22 and the database 4, and the network connection device 5 is also connected to the network connection 23 to connect another processing system 24 and the database 4. In one embodiment, the network connection device 5 may include a Hub (Hub), a Repeater (Repeater) connected to one or more tag item processing systems 22 or other processing systems 24 by wire, such that the network connection device 5 and 1 or more tag item processing systems 22 or other processing systems 24 form a local area network, which is further connected to a shared database 4 via the internet 6, the tag item processing systems 22 can be connected to the database 4, establish connection, and access data of the database 4, the database 4 has multiple functions according to the RFID industry and application, including querying names or codes of tag item processing systems, item codes of electronic tags and names or codes thereof, names or codes of stores and goods, names or codes of bus routes and stations, querying names or codes of companies or organizations according to the uniform serial number of business persons, and querying names or codes of companies or organizations according to the uniform serial number of business persons, The name or code of the cell and its area and location and building and floor and room, the credit balance and personal information … of the account according to the user's credit account. In another embodiment, the network connection device 5 further includes a WiFi Wireless Access Point (AP) for wirelessly connecting to one or more tag item processing systems 22 or other processing systems 24, such that the network connection device 5 and 1 or more tag item processing systems 22 or other processing systems 24 form a Wireless local area network, which is further connected to the internet 6, Wireless mobile network device 7, and shared database 4, and the tag item processing system 22 can establish connection with the database 4 and the Wireless mobile network device 7 and Access data of the database 4, and can also transmit short messages, images, or short messages and images to a display with an IP address or a mobile device receiving a short message number via the internet 6. In another embodiment, the network connection device 5 can be connected to one or more tag item processing systems 22 or other processing systems 24 both by wire and wirelessly, such that the network connection device 5 and 1 or more tag item processing systems 22 or other processing systems 24 form a comprehensive local area network, which is then connected to the shared database 4 and wireless mobile network device 7 via the internet 6, and the tag item processing system 22 can establish a connection with the internet 6, the database 4, and the wireless mobile network device 7 and access the data of the database 4 or transmit short messages, images, or short messages and images to a display having an IP address or to a mobile device having a number for receiving short messages. In a preferred embodiment, when the user uses a financial cash authentication card on aATM or nuFAD, the tag item processing system 22 requests the user to input an authentication password using the numeric keypad 223, the first stage authentication procedure of the present application authenticates the financial cash authentication card, and reads the information of the electronic tag 3 stored in the authentication card including an authentication information and a deposit and withdrawal account number after passing, the second stage authentication procedure of the present application confirms that the electronic tag 3 belongs to the same system, compares the input authentication password with the authentication information to authenticate the user, establishes a connection with the database 4 after passing, obtains the balance of the deposit and withdrawal account number from the database 4 by using the deposit and withdrawal account number, and deposits a withdrawal amount in the financial cash authentication card by using the deposit and withdrawal operation procedure and selecting the currency identification function enabled by the financial cash authentication card, and can transmit the transaction summary to a mobile device having a short message receiving number.
Please refer to fig. 2, which is a schematic diagram of an electronic tag 3 according to a second preferred embodiment of the present application. The electronic tag 3 in fig. 2 further shows that the item information table 33 includes the first authentication information 350, the first encryption key 352, the first other information 354, the second authentication information 371, the second encryption key 370, the second other information 372, the third information table 3E0, and the information stored in the reserved memory block 3B. The first authentication information 350 includes an item code 357 and a user number 355. In one embodiment, the user number is a system constant value, and in a preferred embodiment, the user number is a system code number. The first additional information 354 includes an item number 358 and first PC information 351, wherein the first PC information 351 indicates that the first information table 35 is a read memory block RB1 shown in fig. 1, and in one embodiment, the first PC information 351 is a Protocol Control (PC) word specified or functionally equivalent to the ISO18000-6C communication interface, the PC word can be used to include a first information table length value, i.e., a number of words, the first encryption key 352 includes encrypted second sub-information 353, and the second sub-information 353 is a second information table length value, i.e., a number of words. The tag entry processing system 22 decrypts the first encryption key 352 to obtain the second sub-information 353 to read the second information table 39, such as the read memory block RB2 in fig. 2. The second authentication information 371 includes a deposit and withdrawal password 375, a temporary counter password 377, a credit card password 37A, and a cash card balance 379. The second additional information 372 includes a debit account number 374, a credit card number 376, and cash card balance information 378. In one embodiment, the third information table 3E0 includes transfer account number table 3E1, and in a preferred embodiment, the third information table 3E0 may include RFID traffic control table 3E2, received short message number table 3E3, or a combination thereof. The reserved memory block 3B stores an item destroy password 3B1 and an item access password 3B 2. The item information table 33 further includes an item destruction password 3B1 and an item access password 3B 2. The second encryption key 370 is a link key, the second encryption key 370 comprises a third sub-information 373, the third sub-information 373 is a third information table length value, i.e. a number of words, in one embodiment, the tag item processing system 22 reads the third information table 3E0 and the transfer account table 3E1 in the user memory block 3E according to the third sub-information 373, in a preferred embodiment, the RFID password table 3E2 or the received short message number table 3E 3.
In fig. 2, the second memory block 38 includes the first memory block 36, and the first information table 35 and the second information table 39 are stored in the second memory block 38. In a preferred embodiment, the second memory block 38 may not include the first memory block 36.
Please refer to fig. 3, which is a parameter configuration diagram illustrating a financial credit cash authentication card (not shown) including an electronic tag 30 for establishing a project information table 33 according to a tag memory address according to a third preferred embodiment of the present application. As shown in fig. 3, the figure shows an encryption key used by the present application to authenticate an electronic tag, a plurality of sets of passwords for use, and an item information table 33 with encoding parameters, where the parameters in the item information table 33 have one or more of the following fields, for example: the item code 357, the credit card code 37A, the temporary counter code 377, the cash card store code 37G, the cash card commodity number 37I, etc. are set parameters in a word, the cash card balance 379 is set parameters in a word, the first encryption key 352, the second encryption key 370, the deposit and withdrawal code 375, etc. are set parameters in a word, and the deposit and withdrawal account 374, the credit card number 376, etc. are set parameters in a word. The 0 th to 15 th bits of the word parameter may be collectively 16 bits of the parameter name [15:0]]Representing, e.g. item code [15:0]]Credit card code [15:0]And temporary cabinet password [15:0]Cash card store code [15:0]]And cash card commodity number [15:0]The 0 th to 31 th bits of the two-word parameter may have 32-bits with parameter names [31:0]]Indicating, e.g. cash card balance [31:0]The 0 th to 15 th bits of the two-word parameter are 16 bits of the first word with parameter name [15:0]]Indicating, e.g. cash card balance [15:0]The 16 th to 31 th bits of the two-word parameter are 16 bits of the second word parameter's parameter name [31:16]]Presentation, e.g. cashCard balance [31:16]The 0 th to 47 th bits of the three-word parameter can be named by parameter name [47:0]]Indicating, e.g., a first encryption key [47:0]]Second encryption Key [47:0]]Deposit and withdrawal password [47:0]]And the 0 th to 15 th bits of the three-word parameter are 16 bits of the first word with parameter name [15:0]]Indicating, e.g., a first encryption key [15:0]]Second encryption Key [15:0]]Deposit and withdrawal password [15:0]]16 bits of the 16 th to 31 th bits of the three-word parameter are the second word with the parameter name [31:16]]Indicating, e.g., a first encryption key [31:16]]A second encryption key [31:16]]Deposit and withdrawal password [31:16]]The 32 th to 47 th bits of the three-word parameter are 16 bits of the three-word parameter whose third word can be the parameter name [47:32]]Indicating, e.g., a first encryption key [47:32]]Second encryption key [47:32]]Deposit and withdraw password [47:32]]Etc. the 0 th to 63 th bits of the quad-parameter may be designated by the parameter name [63:0]]Indicating, e.g. deposit of withdrawal account number [63:0]]Credit card number [63:0]And the 0 th to 15 th bits of the four-word parameter are 16 bits of the first word with parameter name [15:0]]Indicating, e.g. deposit of withdrawal account [15:0]]Credit card number [15:0]16 bits 16-31 of the four-word parameter are the second word with the parameter name [31: 16%]Indicating, e.g. depositing, withdrawal account [31:16]]Credit card number [31:16]]The 32 th to 47 th bits of the four-word parameter are 16 bits of the third word parameter which can be the parameter name [47:32]]Indicating, e.g. depositing, withdrawal account [47:32]]Credit card number [47:32]]The 48 th to 63 th bits of the four-word parameter are 16 bits whose fourth word can be the parameter name [63:48 ]]Indicating, e.g. depositing, withdrawal account number [63:48 ]]Credit card number [63:48 ]]And the like. In a preferred embodiment, the number of words of the parameters in the item information table 33 may be changed according to the industry and application requirements, or some parameters may be replaced, deleted, or added, for example: when the second encryption key 370 is not used, the second encryption key 370 may be replaced with a three-word or four-word received short message number 370. The tag memory 34 of the electronic tag 30 uses a tag memory conforming to the ISO18000-6C communication interface specification or the same function. The electronic Tag 30 has a Reserved Memory (RM) block 3B, a Tag Identifier (TID) block 3C, and a Unique Item Identifier (UII) MemoryBlock 3D, and User Memory block 3E (UM). The tag Memory 34 of the electronic tag 30 is divided into 4 banks (Memory banks) according to the leftmost 2 bits of the tag Memory address, where the leftmost 2 bits are 002The TID memory block 3C stores a tag serial number 313 and a manufacturer number 314, 0123D stores a first information table and a second information table representing the UII memory block, 102The RM memory block 3B stores an item destruction password 3B1 and item access passwords 3B2 and 112Representing that the UM memory block 3E stores a third information table, the tag serial number 313 is a three-word parameter, the 16 bits from 0 th to 15 th are the first word, the 16 bits from 16 th to 31 th are the second word, and the 16 bits from 32 th to 47 th are the third word, respectively, with tag serial numbers [15: 0%]Label number [31:16]]And a tag number [47:32]]As shown, the manufacturer number 314 is a word parameter, and the 16 th bits from 0 th to 15 th bits can be the manufacturer number [15:0]]It shows that the item destruction password 3B1 and the item access password 3B2 are two-word parameters, and the 16 th bits from 0 th to 15 th bits are the first word thereof, which can be used as the item destruction password [15: 0%]And item access password [15:0]Indicating that 16 bits from 16 th to 31 th bit are the second word group which can be destroyed by item [31:16]]And item access password [31:16]And (4) showing. The third preferred embodiment of the present application is to apply the present invention to the manufacture of financial credit cash authentication cards for the financial industry, for example, the financial credit cash authentication card comprises a bank temporary cabinet service selection, a cash authentication card or a financial cash authentication card or a credit cash authentication card for manufacturing a ultrahigh frequency long distance, a financial cash authentication card or a credit cash authentication card for manufacturing a high frequency short distance, a cash authentication card or a financial cash authentication card or a credit cash authentication card for manufacturing a ultrahigh frequency long distance by being associated with an enterprise or an organization, a cash authentication card or a financial cash authentication card or a credit cash authentication card for manufacturing a high frequency short distance by being associated with an enterprise or an organization, and may also choose to make a currency type for storing cash for the cash card balance 379 of the cash authentication card, which may then be used for cash consumption or value storage.
Referring to FIG. 3, memory addresses 400 in the UII memory block 3DH~47FHThere are 8 words for the first block 36 in FIG. 2 that store the first table 35, and the memory address 480H~5FFHThere are 24 words to store the second information table 37. In one embodiment, when the tag item processing system 22 selects and checks the electronic tag 3 via the reader 221 in the first authentication stage, the first information table 35 replies the information of the reader 221 to the electronic tag 3 in a backscattering manner, and the length value of the first information table 35 is checked to confirm that the electronic tag 3 belongs to the same system, the first information table 35 includes the first PC information 351, the item code 357, the item number 358, the user number 355, the first encryption key 352, and a CRC error detection code, and the user number 355 is the user number from 1. In a preferred embodiment, the user number 355 is an item expiration date. In another preferred embodiment, the user number 355 is a system number representing a project information table system established in an electronic tag, and the system number includes 1 representing a financial authentication card system, 2 representing a financial cash authentication card system, 3 representing a credit cash authentication card system, and 4 representing a financial credit cash authentication card system. The tag item processing system 22 reads the information of the second information table 37 in the electronic tag 3 via the reader 221 in the second authentication stage, which includes the deposit and withdrawal account 374, the credit card number 376, the deposit and withdrawal password 375, the credit card password 37A, the temporary counter password 377, the number of failed comparisons 37E, the second encryption key 370, and a cash card balance information 378, where the cash card balance information 378 includes a cash card balance currency 37F, a cash card store code 37G, a cash card product number 37I, a cash card bus stop number 37J, and a cash card use status 37K. In a preferred embodiment, the length value, i.e. the number of words, of the first information table 35 in the UII memory block 3D may vary according to different industry and application requirements, and is not limited to 8 words. The tagged item processing system 22 reads the manufacturer number 314 and tag number 313 of the TID memory block 3C after successfully passing the first authentication phase. In one embodiment, the tag item processing system 22 exceeds a maximum number of failed comparisons 37EWhen the tag item processing system 22 generates a set of item destruction password values according to the tag serial number 313 to initiate a destroy tag program, the tag 3 can no longer talk to the tag item processing system 22.
In FIG. 3, the electronic tag 30 includes a first PC message 351 having a 16-bit word, and the 0 th bit to the 15 th bit of the first PC message 351 have 16 bits for PC [15:0]]Indicating that the 0 th to 4 th bits of the first PC information 351 are 5 bits representing the first sub information can be PC [4: 0]]Indicating that 11 bits of the 5 th to 15 th bits of the first PC information 351 may be PC [15:5 ] for controlling the number of words to read the UII memory block]It shows, though in the ISO18000-6C communication interface specification PC [15:5 ]]The number of words of the UII memory block is read independently, but is set according to the specification. In a preferred embodiment, other communication interface provisions may reduce PC [15:5 ]]By increasing the number of bits of the first sub information by 11 bits, it is possible to control the number of read more word groups. In order to make the first authentication phase of the tag item processing system 22 read only to the first information table 35, the PC [4: 0] is used to establish the electronic tag 30]That is, the tag item processing system 22 obtains the second sub-information 353, for example, 23, when decrypting the first encryption key 352, and the length value of the second information table 37 is 24 words, and the second sub-information 353 is verified to authenticate the electronic tag 3 and confirm that the electronic tag 3 belongs to the same system as the electronic tag 3. In one embodiment, the method of reading the memory block RB2 is to specify a start address and a read word number of the second memory block 38. In a preferred embodiment, the termination address is preset to 01000BAt 5 bits 11111BRepresents starting address 11111BInitially, the memory block RB2 is read in a decrement 1 manner to the end address 01000BThere are 24 character groups. In another embodiment, a start address and an end address of the second memory block 38 are specified to read the memory block RB 2. The same method can also be used to read the memory block RB3 according to the third sub information 373.
In FIG. 3, a third embodiment according to the present applicationAn encoded item code 357 is created, so that the electronic tag 30 is an encoded item information table. The item code 357 is a 16-bit word whose 0 th to 15 th bits have 16 bits that can be encoded with the item code [15:0]]It is shown that, in one embodiment, the method of creating the item code 357 includes encoding the item code [15: 0%]The 16 bit classification of (1) is as follows: item code [15:13]Bits 13-15 representing the item code 357 represent the RFID industry sub-category, item code [12:11 ]]Bits 11-12 representing the item code 357 represent the RFID device sub-category, item code [10: 9]]Bits 9-10 representing the item code 357 represent an RFID selective enablement function sub-category, item code [8: 6]]Bits 6-8 representing the item code 357 represent an RFID function sub-category, and an item code [5: 0%]Bits 0 through 5 representing the item code 357 represent 4 sub-category codes such as the country sub-category of the RFID implementation. In one embodiment, the encoding scheme of the RFID industry subclass, which encodes the item code [15:13 ], may vary depending on the RFID industry and application]The 3 bits of (a) can define 8 RFID industries such as: 000B001 representing the finance industryB010 representing the traffic industryBRepresentative of the logistics industry, 011BRepresenting a supply chain, 100BRepresenting a project level pursuit 101BRepresentative of the door Access and asset management industry, 110BRepresenting the scientific and technological industries, and 111BRepresenting the system reservation industry.
The RFID device is sub-classified as encoding the item [12:11 ]]2 bits of (2) are obtained by manufacturing the tag and combining the tag with other devices to score 4 devices, in one embodiment, the item code [12:11 ]]Is 00BThen it represents that the electronic tag 3 is combined with a non-conductive Adhesive Label (Adhesive Label) device, which is 01BIt represents a nonconductive plastic packaging device in combination with the electronic tag 3, the device having a shape of a card having a thickness, a box shape, a circle, a polygonal polygon, or a shape representing one person's thing or area, 10BIt represents a sensing device associated with the electronic tag 3, which comprises a device for receiving, displaying and storing short messages or images, which is associated with the electronic tag 3 and a network display or mobile device, is11BIt is representative of devices that are associated with the electronic tag 3 that are made of other materials, such as non-conductive wood, leather, non-woven fabric, or any combination of packaging materials that attach non-conductive materials to metal.
The RFID selection enablement function is sub-classified as encoding the item [10: 9]]2 bits of (a) are the user's selection of the enablement function (Enabler) to be incorporated for each RFID industry sub-category, in one embodiment, the item is encoded [10: 9] when the RFID industry sub-category is financial]Is 00BThe representative of the functions of starting finance, credit, temporary counter service, entrance guard, item level tracking, cash consumption and the like is 01BRepresenting functions of enabling finance, credit, clinical counter service, cash consumption, cash balance selection, door control, and item level tracking, 10BThe representative starting functions of finance, credit, temporary counter service, cash consumption, short message transmission, entrance guard, item level tracking and the like are 11BThe delegate enables financial, credit, locker services, cash consumption, and system reservation functions.
The RFID function is sub-classified as encoding the item [8: 6]]The 3 bits of (1) are 8 RFID function options according to the function of the electronic tag combined in the application process for a sub-classification of the RFID industry, for example: when the RFID industry is sub-classified as financial, the item is encoded [8: 6]]Is 000BThe representative has functions of finance, credit, temporary counter service, cash consumption, short message transmission, and passive ultrahigh frequency long distance, and is 001BThe representative has functions of finance, credit, temporary counter service, cash consumption, short message transmission, cash balance currency selection, passive ultrahigh frequency short distance, 010BThe representative has functions of finance, credit, temporary counter service, cash consumption, short message transmission, passive ultrahigh frequency short distance, etc., and is 011BThe representative has functions of finance, credit, temporary counter service, cash consumption, short message transmission, passive type ultrahigh frequency short distance high memory capacity, etc. and is 100BThe representative has functions of finance, credit, temporary counter service, cash consumption, short message transmission, high frequency short distance, etc. and is 101BRepresentatives having financial, credit, counter service, cash consumption110 functions of short message transmission, cash card balance identification, high frequency short distance, etcBThe representative has functions of finance, temporary counter service, cash consumption, short message transmission, door control, project level tracking, passive ultrahigh frequency long distance, etc., and is 111BThe representative has functions of finance, cabinet facing service, cash consumption, short message transmission, door control, project level tracking, high frequency short distance and the like. In a preferred embodiment, when the RFID industry is sub-classified as traffic, the item is encoded [8: 6]]Is 000B001 represents the Semi-passive (Semi-passive) ultrahigh frequency remote (more than 50-100 meters) function for positioning and using in high-speed railway and bus driving roomB010 means a function of semi-passive UHF remote and high memory capacity (more than 8 kbytes)BThe passive ultrahigh frequency long distance (more than 5-10 meters) function is 011 for patrol positioning and automatic intelligent parking lotBRepresenting the function of passive ultrahigh frequency long distance and high memory capacity (more than 64 kbytes), is 100B101 represents a passive ultrahigh frequency short distance (below 50-100 cm) function for an automatic parking lotB110 for passive ultrahigh frequency short distance and high memory capacityBThe passive high-frequency short-distance (less than 5-10 cm) function is 111 for gate control and patrol positioningBRepresenting passive high frequency short distance and high memory capacity functions.
The RFID enforcement country sub-classification encodes the item [5:0]The 6 bits of (1) can be divided into 64 countries and regions according to RFID implementing countries of the electronic tags for an RFID industry sub-classification, in one embodiment, the item code [5: 0%]Is 01HRepresents the Australia area and is 20HRepresents Taiwan area and is 60HRepresenting united states area …, etc.
In combination with the above description of the item code 357 and its various sub-categories, the tagged item processing system 22 encodes the item [15:0] according to industry and application]Encoding is performed, for example: in one embodiment, when an item is encoded [15:0]]To 0981HIn time, the RFID device represents a plastic card used in the Australian finance industry, and enables finance and creditRFID functions such as transaction, cash consumption, short message delivery, door entry, item level tracking, and passive UHF long distance, in another embodiment, when the item is encoded [15: 0%]Is 0A68HIn time, it represents a plastic card RFID device used in the taiwan financial industry, and enables RFID functions such as finance, credit, temporary counter service, cash consumption, short message transmission, cash balance selection, door access, item level tracking, and passive uhf long distance. After an item code 357 is created in the electronic tag 30, the item code 357 can be used as a basis for the tag item processing system 22 to select the electronic tag 3 via the reader 221.
In FIG. 3, according to the third embodiment of the present application, an item number 358 is constructed as a 16-bit word, and the 16-bit positions from 0 th to 15 th of the item number 358 can be the item numbers [15:0]]It is shown that the method of establishing the item number 358 is organized to number the RFID industry subclass of an item code 357, and in one embodiment, the item number [15:0] is assigned when the RFID industry subclass of the item code 357 is financial]Is 0007HCan represent the first bank, is 0013HWhich may represent the national Thailand Bank, in another embodiment, the item number [15:0] when the RFID industry subclass of the item code 357 is logistics]Is 1010HMay represent Yangming maritime …, etc. In a preferred embodiment, the item number 358 is numbered for the RFID industry sub-category of the item code 357 according to its sub-categories of area, location, Building (Building), and floor.
In FIG. 3, according to the third embodiment of the present application, a user number 355 is constructed as a 16-bit word, and the 16 bits from 0 th to 15 th of the user number 355 can be the user number [15:0]]It is noted that in one embodiment, the user number 355 is created sequentially for the user using the item number 357 and the item number 358, for example, a student at a school, a customer at a member store, a resident at a community, a company employee, or an online product or package can be numbered sequentially from 1. In a preferred embodiment, the project catalog is not usedCode 357 and item number 358, the user number 355 can be set by the tag item processing system 22 in order from 1, or set as a system number representing a system of item information table established on an electronic tag, which includes a financial authentication card system represented by 1, a financial cash authentication card system represented by 2, a credit cash authentication card system represented by 3, a financial credit cash authentication card system represented by 4, a financial access authentication card system represented by 5, a financial cash access authentication card system represented by 6, a credit cash access authentication card system represented by 7, and a financial credit cash access authentication card system represented by 8. In another preferred embodiment, the item code 357 represents item-level tracking for Taiwan plastic cards with cash-consuming passive high-frequency short-range functionality, and the item number 358 represents an RFID card manufacturing company that classifies the 16-bit user number 355 as: user number [15:8 ]]8 bits representing the 8 th to 15 th of the user number 355 represent a user Group (Group) sub-class and a user number [7: 0]]The 0 th to 7 th bits of the user number 355 represent 2 sub-category codes such as discount sub-category, for example, in a public transportation bus system, the user group sub-category is the user number [15:8 ]]8 bits and the preferential discount subcategory, i.e., user number [7: 0]]The 8 bits of (a) may be defined simultaneously, for example: 01DThe discount percentage for the general passenger is 100D、02DThe discount rate for military police is 80%D、04HThe discount% for students is 70D、05DThe discount% for bus staff is 0D、06DThe preferential discount percentage for the family members of the bus staff is 50D、08DThe discount% for the old is 50DAnd 10DThe preferential discount% for love is 50D…, etc.
In a preferred embodiment, the tagged item processing system 22 establishes an item code [15:0], an item number [15:0], and a user number [15:0] on the electronic tag 30 without the need for the RFID industry sub-category, the RFID selective activation sub-category, the RFID function sub-category, the RFID device sub-category, and the RFID implementing country sub-category, and then associates two 16-bit item codes [15:0] and item numbers [15:0] to establish a 32-bit organization identifier [31:0], such as a company or organization name, its code, or its uniform serial number for the business region and business item. Also in a preferred embodiment, the item code 357 and the item number 358 are a hybrid of an organization, sub-organization, and building.
In fig. 3, the present application uses a plurality of authentication methods to establish second authentication information 371 and second other information 372 required for a second authentication phase in a second information table 37 of an electronic tag 30 of a cash card (not shown), wherein the second authentication information 371 includes a deposit/withdrawal password 375, a temporary cabinet password 377, a credit card password 37A, and a cash card balance 379, and the second other information 372 includes a deposit/withdrawal account 374, a credit card number 376, and cash card balance information 378. In one embodiment, the second authentication information 371 is authenticated by comparing the user's input authentication password with a set of authentication information selected from the second authentication information 371, and then the tag item processing system 22 determines whether the two are the same before using the second additional information 372? In one embodiment, when the user has a financial authentication card to enter a bank to transact financial transactions, the tagged item processing system 22 is first activated, the teller simply places the user's financial authentication card on the platform attached to the reader 221, to then enter an authentication password using the numeric keypad 223, the tag item processing system 22, based on the computer type (CompType) setting of the local computer 222, the computer type is set as the temporary counter service computer, an authentication information is selected from the second authentication information 371 as the temporary counter code 377, then, the password is compared with the password input by the user, and after the password is compared without errors, the subsequent deposit and withdrawal transaction can be carried out by using the deposit and withdrawal account 374, therefore, the bank not only provides the confident service of filling-free deposit and withdrawal documents when the user transacts, but also adds a protection mechanism for the deposit and withdrawal account information of the user. In a preferred embodiment, the method for generating the temporary counter password 377 may be that when the user opens an account in the bank and applies for a financial authentication card, the bank also provides the service of transmitting short messages, the user can receive a deposit and withdrawal account 374, a financial authentication card and a preset temporary counter password 377, the financial authentication card has the corresponding deposit and withdrawal account 374 and a financial authentication card number, the bank teller can use the financial authentication card as long as the bank teller establishes the deposit and withdrawal account 374 or the financial authentication card number corresponding to the user basic data in the database 4 of the bank. When the bank establishes the financial authentication card, the bank can preset a receiving short message number 370 as a default value, and preset a temporary counter password 377 in a random code generating manner, and store the temporary counter password 377 in the financial authentication card together with the deposit and withdrawal account 374, when the user receives the card, the user can change the temporary counter password 377 according to the preset temporary counter password 377 through the label item processing system 22 at any time, and store the number of the short message to be received in the financial authentication card. In a preferred embodiment, when the user uses a financial credit authentication card at aATM, the tagged item processing system 22 selects an authentication information from the second authentication information 371 according to the computer type setting of the local computer 222 as aATM and the authentication type selected by the user, wherein the authentication information can be the deposit and withdrawal password 375 or the credit card password 37A. The method for generating the deposit and withdrawal password 375 and the credit card password 37A can be that when a user opens an account in a bank and applies for a financial credit authentication card, the bank also provides the service of transmitting short messages at the same time, the user can receive a deposit and withdrawal account number 374 or a credit card number 376, a preset deposit and withdrawal password 375 or a preset credit card password 37A and a financial credit authentication card, and the user can use the financial credit authentication card as long as the bank teller establishes the deposit and withdrawal account number 374 or the credit card number 376 corresponding to the basic data of the user in the shared database 4. When the bank establishes the financial credit authentication card, it can preset a receiving short message number 370 as a default value, and preset a deposit and withdrawal password 375 or a credit card password 37A by generating a random code, and store it in the financial credit authentication card together with the deposit and withdrawal account number 374 or the credit card number 376, when the user receives the card, it can change the deposit and withdrawal password 375 or the credit card password 37A by the label item processing system 22 according to the preset deposit and withdrawal password 375 or the preset credit card password 37A, and store the number to receive short messages in the financial credit authentication card. When the financial authentication card contains a cash card balance 379 and a cash card balance currency 37F, the bank teller can firstly confirm that the user has the currency conversion function, then withdraw money from the deposit and withdrawal account 374 according to the user's requirement, execute the currency conversion function, and then transfer the withdrawal amount into the cash card balance 379 of the financial authentication card, so as to be convenient for the user to carry. In another preferred embodiment, when the user uses a financial credit authentication card on nuFAD, the label item processing system 22 will verify the authenticity of the financial credit authentication card a priori and is of the same system as the financial credit authentication card, then, according to the computer type setting of the local computer 222 as nuFAD and the authentication type selected by the user, an authentication information can be selected from the second authentication information 371, the authentication information may be a deposit and withdrawal password 375, a temporary counter password 377, or a credit card password 37A, the user can inquire the balance of the deposit and withdrawal account and the balance of the credit card, can also withdraw money from the deposit and withdrawal account 374, execute the currency conversion function, and then transfer the withdrawal amount to the cash card balance 379 in the financial credit authentication card, in another preferred embodiment, the tag item processing system 22 transmits the transaction digest to the receiving short message number 370 as a credential and as another authentication method.
In a preferred embodiment, the plurality of authentication methods establish second authentication information 371 required for a second authentication phase in a second information table 37 of an electronic tag 30 of a cash authentication card (not shown), the second authentication information 371 only includes a cash card balance 379, and the method for authenticating the cash card balance 379 is that the project tag processing system 22 verifies that the balance of the cash card after deducting the consumption amount is greater than or equal to 0? Referring to fig. 3, the plural authentication methods establish the data of the electronic tag to be screened in the first information table 35 of the electronic tag 30 at the first authentication stage, the first information table 35 includes an item code 357, an item number 358, a user number 355, first PC information 351, and a first encryption key 352, the cash authentication card has an anti-counterfeit function and belongs to a cash authentication card system, the item code 357 and the item number 358 can represent the name of a company or an organization, or a code thereof, or a uniform number of a business person thereof, and serve as a basis for the item tag processing system 22 to select the electronic tag 30, and the cash authentication card with the anti-counterfeit function can also be used in the RFID item level tracking industry, such as: a shopping cash authentication card to replace shopping gift certificates and shopping and cash consumption, a car cash authentication card to take a car and replace change in bus which is inconvenient to store, a book cash authentication card to enter and exit a library and pay the library and cash consumption, an entertainment cash authentication card to enter and exit an entertainment area and pay the entertainment area and cash consumption, a cash consumption authentication card to pay the cash consumption of shops, and a telephone cash authentication card to dial public telephones and pay the cash consumption.
Referring to fig. 2 and 3, in order to make the cash certification card for consumption in different stores, a coded cash card store code 37G is established in the cash card balance information 378 as a 16-bit word, and the 0 th to 15 th bits of the cash card store code 37G are 16 bits in total and can be coded with the cash card store code [15: 0%]It is shown that the method of establishing the cash card store code 37G is to classify the 16 bits of the cash card store code 37G as: cash card store code [15:12 ]]The 12 th to 15 th bits representing the cash card store code 37G represent a store sub-category, a cash card store code [11: 6]]6 bits representing the 6 th to 11 th of the cash card store code 37G represent a store organization sub-category and a cash card store code [5: 0]]The 0 th to 5 th bits of the cash card store code 37G represent 3 sub-classification codes such as a store division organization sub-classification. In a preferred embodiment, the 4-bit of the store operation sub-category can be classified as: 1HRepresentative of the transport service industry, 2HRepresentative of the food and beverage industries, 3HRepresentative of retail, 4HRepresenting department of general merchandise, 5HRepresenting the household electric industry 6HRepresentative of the entertainment industry, 7HRepresentative of the access industry, and other values representative of the reserved store business subcategories, and the 6 bits of the store organization subcategories are numbered for a store business subcategory, such as a retail industry for the store business subcategory: 01HRepresents a 7-11 linkageConvenience store, 02HRepresenting a convenience store of the whole family 03HRepresentative of Yongbao fresh fruit company, 04Hsouth-North coarse cereals, 05HRepresentative of Happy beverage company, 06HThe system maintains a store organization sub-classification on behalf of the daily vending company, and other values, and a transport services sub-classification for that store business may be classified as: 01HRepresenting Taibei passenger traffic company, 02H03, representative of the first department of passenger transportHA beep parking lot company, and other combinations represent a store organization subcategory reserved by the system, and the 6 bits of the store organization subcategory are encoded for a store operation subcategory and a store organization subcategory, for example a beep parking lot company that is classified as a transportation service for the store operation subcategory can be classified as: 01HRepresenting Taibei Shilin stand, 02H03, representing hole division in peach orchardH04-stand clear Water divisionHTainan Yongkang division 05HRepresenting the positive airport division in the peach orchard, and other combinations representing reserved store branch organization subcategories. In combination with the above description of the cash card store code and its subcategories, the tag item processing system 22 may use the cash card store code [15: 0%]Encoding a cash card consumption store, for example: cash card store code [15:0]]Is 10C5HThe place representing the consumer is a division of a Dudu parking lot company in a transportation service industry at an airport in a peach orchard. In a preferred embodiment, the cash card store code 37G can be adjusted to a 2-word group to increase the number of digits in its store operation subcategories, store operation organization subcategories, and store division organization subcategories to cover a greater number of operation organizations and their branches.
In FIG. 3, the present application establishes a coded cash card product number 37I as a 16-bit word in the cash card balance information 378, and the 16 th bit from the 0 th bit to the 15 th bit of the cash card product number 37I can be used as the cash card product number [15: 0%]It is shown that the cash card item number 37I is established by defining the number of each item in a cash card store code 37G for the store, in a preferred embodiment, the cash card item numberNumber [15:0]]The cash card store code 37G is used for carrying out the commodity numbers of 1 to 65,536 items of 7-11 chain supermarkets of the retail industry, wherein 2020DRepresenting a banana, in a preferred embodiment, 1 proceeds for the cash card store code 37G for the national light passenger carrier of the transportation service industryDTo 9999DThe transport route number of the bus, wherein the cash card commodity number [15: 0%]Is 1818DRepresenting a long-distance bus route from Taipei to Zhong hole, in a preferred embodiment, 1 proceeds for the Cash card store code 37G for the network Game world corporation for the entertainment industryDTo 9999DThe game number of the electronic game is a cash card commodity number [15:0]]Is 100DRepresenting a hero alliance, or conducting 1 against the cash card store code 37G for the North and south cereal company of the retail industryDTo 9999DThe commodity number is a cash card commodity number [15:0]]Is 54 ofDRepresents soybeans.
In fig. 3, when the user uses a cash authentication card for cash consumption, the tag item processing system 22 performs a pre-processing (Preprocessing) according to the cash card store code 37G and the cash card product number 37I, which includes authenticating the cash authentication card according to a plurality of authentication methods and belonging to the same system, and then writes the product consumption information such as time, distance, weight, or flow rate of a measured product into the cash authentication card, or in a preferred embodiment, reads the product consumption information of a non-measured product, wherein the product consumption information includes the product bar code or its name. In one embodiment, when the user presents his cash card in front of the tag item processing system 22 for settlement, the tag item processing system 22 will authenticate the cash card again according to a plurality of authentication methods and belong to the same system, display the time, distance, weight or flow rate of the measured commodity, read the unit and unit price of the measured commodity with respect to the time, distance, weight or flow rate from a commodity unit price data table, convert the commodity consumption information of the measured commodity into cash consumption amount, or in another embodiment, display the unit and unit price of the non-measured commodity read from the commodity unit price data table, obtain the quantity of the non-measured commodity, convert the commodity consumption information of the non-measured commodity into cash consumption amount, and deduct the cash consumption amount from the cash card balance of the cash card of the user, and displays and records the transaction including sending a short message or email to the received short message number 370. In one embodiment, when a passenger presents a cash authorization card to ride a bus of a remote passenger car company, the bus uses a wireless bus charge authentication system, which has a tag item processing system 22, the label item processing system 22 first authenticates the cash authentication card, belongs to the same system, and is in a vehicle use state 37K, then the station number 37J of getting on the bus is stored in the cash authentication card, when the passenger gets off the bus and shows the same cash authentication card, the tag item processing system 22 re-authenticates the cash authentication card, belongs to the same system, and is used in a riding status 37K, calculates the riding distance by the number of the boarding/alighting station of the passenger, and converts it into a cash consumption amount, which is then deducted from the cash card balance of the cash authentication card. Referring to fig. 3, in addition to the pre-processing of consumption by the cash card store code 37G and the cash card commodity code 37I, the electronic tag 30 of the present application establishes a user number 357 (hereinafter Rate), a cash card Balance 379 (hereinafter Balance), a cash card use Status 37K (hereinafter Status), and a cash card bus stop number 37J (hereinafter LastSID), and the tag item processing system 22 of the present application is used to track the use Status of a cash authentication card, in one embodiment, the user holds a financial credit authentication card to ride on a remote passenger bus using a wireless bus toll authentication system having a tag item processing system 22, and the tag item processing system 22 includes a local computer, a reader, a display 225, a keyboard, a wireless network, and a wireless network, A wireless network connection device, and a set of system parameters, the wireless network connection device provides a second wireless channel, the set of system parameters includes a driving route number, a driving route data table, and a driving rate data table, the driving route data table includes the names of all stations and important road signs of the driving route, the driver can input the date, the code of the remote passenger company, the bus route number, and the driver number via the keyboard and the display 225, the tag item processing system 22 can talk with the electronic tag 3 in the cash authentication card via a reader 221 and a wireless frequency identification channel 226 to proceed the getting-on, getting-off deduction, and system control procedures, in one embodiment, the tag item processing system 22 goes through the second wireless channel of the wireless network connection device, the wireless channel can be connected with a wireless network via a WiFi wireless access point, so as to obtain the station name or the serial number of the bus passing by the transit station or the global geographic position coordinate thereof. In a preferred embodiment, the wireless channel can be used to read the station name or its number contained in the semi-passive remote electronic tag through another RFID reader. The Status and LastSID in the financial credit cash authentication card both have a default value of 0, indicating waiting for use, when the user presents the cash authentication card in front of the tag item processing system 22, the tag item processing system 22 has already obtained a Current Station number (Current Station ID, hereinafter called Current SID) from the wireless channel, first authenticates the cash authentication card according to a plurality of authentication methods and belongs to the same system, then reads the Status of the cash authentication card and checks the Status value? If Status is 0, carrying out the getting-on procedure, if Status is 1, carrying out the getting-off deduction procedure, if Status is other preset values of the system, carrying out the authentication card abnormal use procedure including displaying the Status and the information that the balance of the authentication card is insufficient, the user does not finish the getting-off procedure, the user does not finish the getting-on procedure, or entering a system authentication user identification mode, and obtaining the user identification by inputting the user number and the authentication password, after confirming the success of the user number and the authentication password, selecting and executing a system function including inputting the date and the driver number, setting the driving route number, loading the driving route data table, loading the driving rate vehicle data table, inquiring the driving route and the driving rate vehicle data, reading the accumulated current collection amount, reading the collection record one by one, reading the pre-borrowing cash one by one, resetting the Status of the authentication card and LastSID to 0 to enable the cash authentication card to be recovered for use, Canceling a single collection record, clearing a single collection record, inquiring the station name or code number of the driving route, inquiring the time table of the driving route, inquiring the station record of the driving route, and Self-testing (Self-Test) of the tag item processing system. Getting on the bus: the tag item processing system 22 will check CurrentSID? If they are equal, the tag item processing system 22 will display that the user has paid, and then the communication connection is terminated, if they are not equal, the bus tag item processing system 22 will store the currentSID in LastSID, the remote passenger company code in the cash card store code 37G, and the route number in the cash card goods number 37I, the tag item processing system 22 will store 1 in the Status, which indicates that the user has got on the bus, and transmit a transaction short message or e-mail to the received short message number 370, and then terminate the communication connection. A lower fee deduction program: the tag item processing system 22 stores 2 in the Status indicating an entrance to a debit program and is displayed on the display 225, the tag item processing system 22 reads the cash card store code 37G and the cash card product number 37I, and then checks [ the cash card store code 37G is the remote passenger company code ] and [ the cash card product number 37I is the route number ]? If they are not equal, it means that the user has not completed the deduction process when he used the authentication card last time, the tag item processing system 22 will display an abnormal condition, the authentication card cannot be used at present, and then the communication connection is terminated, and if they are equal, the tag item processing system 22 will check that CurrentSID is LastSID? If they are equal, the tag item processing system 22 will display that the user has got on the bus, and then end the communication connection, and if they are not equal, it indicates that the user is ready to get off the bus, the tag item processing system 22 will read the Rate, LastSID, and Balance of the authentication card, and use the Rate, CurrentSID, and LastSID to obtain the vehicle asset from the bus Rate vehicle asset data table, and then check Balance ≧ Fare? If so, the tag item processing system 22 will deduct face from the Balance and save the remainder back to the Balance, deposit CurrentSID into LastSID, and deposit 0 into Status, indicating a successful debit, display and send a transaction short message or email on display 225 to the receiving short message number 370, and record the amount of money received, if not, the tag item processing system 22 will deposit Status into 3, indicating that the Balance is insufficient, display on display 225, and store the record that the cash Balance is insufficient, then deposit 4 into the Status, indicating that a credit card pre-borrowing cash procedure is entered and displayed on display 225, then pre-borrow a fixed amount of cash from the user's credit card number 376, add the fixed amount to the Balance, display on display 225, and record the cash transaction as payment for the user including sending a short transaction credential or email to the receiving short message number 370, then 2 is stored in the Status, and the procedure of deducting money is carried out, if the Balance is still insufficient, 3 is stored in the Status, and the procedure of insufficient Balance of cash card and pre-borrowing cash is repeated until money deduction is successful. In a preferred embodiment, when Balance is insufficient, the tag item processing system 22 may also enter a financial card prepaid cash program and display it on display 225, then prepay a quota of cash from the user's debit account 374, add the quota amount to the Balance, display it on display 225, and record the prepay cash transaction as a user prepay credential including sending a transaction short message or email to the receiving short message number 370. In a preferred embodiment, when the tag item processing system 22 detects via the second wireless channel of the wireless network connection device that the station name or the number thereof appearing ahead is the next station name or the number thereof in the driving route data table, or the important road sign or the number thereof, it can broadcast or display the approaching station name or road sign name, and transmit the short message or the e-mail to a wireless radio frequency identification authentication system and a wireless radio frequency identification information system, and can broadcast or display the expected next station name when detecting that the station or road sign is out of the signal range of the current station or road sign or no passenger gets off the vehicle. In another preferred embodiment, the tag item processing system 22 can be connected to a wireless network via the wireless network connection device to wirelessly transmit a geographic location information and an attendance information to the bus authentication system 2 and the bus information system 1 of the remote passenger company for subsequent processing, wherein the geographic location information can include time, driving route, vehicle number, driver number, cash authentication card number and authentication abnormal condition, and global geographic latitude and longitude coordinates, the attendance information includes short message, image, or short message and image, wherein the short message is a predetermined scene state or a brief scene of a human being, and the image can be a shot scene picture.
Referring to fig. 3, the adjusted parameter character set number according to the third embodiment of the present application can be added to the cash card balance information 378 to obtain a cash card unit price and a product consumption amount, and the cash card bus station number 37J is used as the cash card product weight. In a preferred embodiment, a grocery store's merchandise-charging authentication system converts the amount of merchandise measurable in its store into a consumption amount by weight, the grocery store's merchandise-charging authentication system using an RFID tag item processing system 22, the RFID tag item processing system 22 comprising a local computer, a reader, an electronic scale, a bar code scanner, and a receipt printer, the reader, the electronic scale, the bar code scanner, and the receipt printer all having USB connectors for plugging into a USB port of the local computer, the RFID tag item processing system 22 also comprising a unit price data sheet of merchandise, when a user purchases a 2 kg of soybeans at the grocery store using a cash authentication card, if the user decides to purchase 2 kg of soybeans, the grocery store clerk first inputs a merchandise name or code number using the bar code scanner, touch screen, or numeric keypad, the consumption preprocessing of the RFID label item processing system 22 will obtain the unit price of the commodity from the unit price data table of the commodity, the clerk will use the electronic scale to scale the weight of the commodity, then the RFID label item processing system 22 will convert the weight of the commodity into unit and multiply the unit price of the commodity, then the consumption amount of the commodity can be calculated, after the user confirms, and when the cash authentication card is presented to the RFID label item processing system 22 for settlement, the RFID label item processing system 22 will authenticate the cash authentication card according to a plurality of authentication methods and belong to the same system, then proceed the cash card deduction program, update and display the cash card balance 379 of the cash authentication card, record the commodity name or code number, the weight of the commodity, and the consumption amount of the commodity, and store it to the cash authentication card and transmit it to the receipt printer for printing to the user as the transaction data, a transaction short message or e-mail may also be sent to the receiving short message number 370 as a credential and another authentication method.
In FIG. 3, the present application establishes a cash card balance information 378 on the electronic tag 30, the cash card balance information 378 further includes a word group establishing a cash card balance currency 37F as a 16-bit word group, and 16 bits of the cash card balance currency 37F from 0 th bit to 15 th bit can be used for the cash card balance currency [15: 0%]Showing that the method for establishing the cash card balance currency 37F is to use the cash card balance currency [15: 0%]The 16 bit classification of (1) is as follows: cash card balance currency [15:12 ]]The 12 th to 15 th digits of the cash card balance currency 37F represent the selected currency exchange function check code category, the cash card balance currency [11: 8:]representing a total of 4 bits from 8 th to 11 th representing a designated cash card balance storage width and accuracy format sub-classification, and a cash card balance currency [7: 0%]The 8 th bits from 0 th to 7 th represent 3 sub-classification codes such as currency sub-classification. In a preferred embodiment, the cash card balance identifier 37F is encoded as follows: the selected currency exchange function check code is classified as cash card balance currency [15: 12%]The 4 bits of (1) include 16 states to show the usage status of the cash card balance category 37F, for example: 0000B0001 for no currency exchange functionB0010 indicating that no currency exchange function has been selectedB0011 indicating selected denomination exchange functionB0100 representing the designated cash card balance storage width and accuracy formatBRepresenting the completion of the enabled credit exchange function, and other value-representing system reservation purposes, the specified cash card balance storage width and accuracy format is classified as a cash card balance credit [11:8]The 4 bits of (1) include 16 formats for displaying the cash card balance 379 as a 32-bit floating point variable, such as: 0000BA floating point number of 0001 bit representing a specified width of 7 bits and a decimal point of 0 bitB0010, which represents a floating-point number of a specified width of 7 bits and a decimal point of 1 bitBA floating-point number representing a specified width of 7 bits and a decimal point of 2 bits, andother values represent system retention patterns, the currency category being cash card balance currency [7:0]The 8 digits can be used to represent 256 national currencies, and the characters or symbols can also be used to represent the commonly used national currencies, such as: a represents the dollar, B represents the pound, C represents the RMB, E represents the Euro, J represents the Japanese dollar, T represents the New Tibet dollar, and other values represent the system retention mode. In a preferred embodiment, when a user consumes a financial credit cash authentication card, the tag item processing system 22 may authenticate the card as authentic and belonging to the same system before deduction, and then check the selected currency exchange function check code of the cash card balance currency 37F to confirm that the user has activated the selected currency exchange function, and then check whether the consumed currency is the same as the currency classified by the currency classification of the cash card balance currency 37F? If the two coins are the same, check if the cash card balance 379 is ≧ 0? If yes, deduct the amount of money from the cash card balance 379, otherwise, borrow a certain amount of cash from the credit card number and deposit into the cash card balance 379, and then deduct money again. If the two coins are different, the consumption amount is converted into the coin classified by the coin classification of the cash card balance coin 37F, and then the money deduction is carried out, so that the exchange rate conversion problem between different currencies can be solved, for example, when the table coin is converted into the dollar, if the converted dollar is stored, the dollar may contain yuan, cornet or minutes, which is inconvenient, therefore, when the invention is used as a global cash authentication card, the invention has the advantages of not only enhancing the anti-counterfeiting mechanism of the system, but also avoiding the trouble of how to store currencies of different countries for the user.
Please refer to fig. 4, which is a diagram illustrating a third information table 3E0 established in the memory block 3E of the user of the electronic tag 30 in a cash credit card (not shown). In a preferred embodiment, tag entry processing system 22 decrypts second encryption key 370 in UII memory block 3D to obtain third sub-information 373, which is the length value, i.e., the number of words, of third information table 3E0 stored in user memory block 3E. Referring to fig. 4(a), it is shown that the third information table 3E0 includes a transfer account table 3E1, and the transfer account table 3E1 includes transfer account numbers 1[79:0], 2[79:0], 3[79:0], 4[79:0], 5[79:0], and 6[79:0] which are all 5-word parameters with 80 digits from 0 to 79. In a preferred embodiment, the third information table 3E0 further comprises an RFID pass control table, or a received short message number table, or a combination thereof, please refer to fig. 4(b), the third information table 3E0 is an embodiment comprising transfer account number table 3E1, RFID pass control table 3E2, and received short message number table 3E3, the RFID pass control table 3E2 comprises a control area number [63:0] and the received short message number table 3E3 comprises a received short message number 1[63:0] and a received short message number 2[63:0] which are all 4-word group parameters with 64 bits from 0 to 63. In a preferred embodiment, the tag item processing system 22 selects the received short message number 1 or the received short message number 2 to send financial transaction information or other industry information based on the RFID industry subcategory code. In one embodiment, as shown in fig. 4, the third memory block 3G corresponds to the user memory block 3E, however, the third memory block 3G does not include the first memory block 36, and the read memory block RB3 indicated by the third sub information 373 does not include the first memory block 36. Also in a preferred embodiment, when UII memory block 3D is large enough to accommodate the third information table 3E0, the third information table 3E0 can be stored in UII memory block 3D without storing in UM memory block 3E.
Please refer to fig. 5, which is a diagram illustrating the generation and decryption of a first encryption key 352 when creating the item information table 33 according to a third embodiment of the present application. In one embodiment, as shown in FIG. 5(a), the first encryption key 352 is generated by encrypting the tag serial number 313, the user number 355, and the second sub-information 353, and the first encryption key 352 may represent, for example, the first encryption key [47:32], the first encryption key [31:16], and the first encryption key [15:0] in 3 words or represent, for example, the first encryption key [47:0] with one 48 bits. The encryption operation of the first encryption key 352 may be an arithmetic or logical operation of addition and subtraction, and fig. 5(a) is an embodiment of the addition operation. In fig. 5(a), the tag number 313 and the user number 355 are added to obtain a first result, and the first result is added to the second sub-information 353 to obtain the first encryption key 352. In a preferred embodiment, the first encryption key 352 is generated by encrypting the tag serial number 313 and the second sub-message 353 or a multiple of the second sub-message 353. In a preferred embodiment, the final first encryption key 352 may extract 1 word, such as the first encryption key [15:0], or 2 words, such as the first encryption key [31:16] and the first encryption key [15:0], from the result of the encryption operation. As shown in fig. 5(b), the second sub-information 353 is obtained by decrypting the first encryption key 352, the tag serial number 313, and the user number 355. The decryption operation of the second sub information 353 can be as shown in fig. 5 (b). In fig. 5(b), the first encryption key 352 and the tag number 313 are subtracted to obtain a second result, and the second result and the user number 355 are subtracted to obtain a second sub-information 353.
Please refer to fig. 6, which is a diagram illustrating the generation of the second encryption key 370 and the decryption thereof. In one embodiment, as shown in fig. 6(a), the second encryption key 370 is obtained by encrypting the tag number 313 and the third sub-information 373, wherein the third sub-information 373 can also be a multiple thereof, and the second encryption key 370 can be represented by 3 words, such as the second encryption key [47:32], the second encryption key [31:16], and the second encryption key [15:0], or by 48 bits, such as the second encryption key [47:0 ]. The encryption operation of the second encryption key 370 may be an arithmetic or logical operation of addition and subtraction, and fig. 6(a) is an embodiment of the addition operation. In fig. 6(a), the tag number 313 and the third sub information 373 are added to obtain the second encryption key 370. In a preferred embodiment, the second encryption key 370 may be generated by encrypting the third sub-information 373 or a multiple thereof. In a preferred embodiment, the final second encryption key 370 may be 1 word, such as the second encryption key [15:0], or 2 words, such as the second encryption key [31:16] and the second encryption key [15:0], extracted from the result of the encryption operation. In fig. 6(b), the second encryption key 370 and the tag number 313 are subjected to subtraction and inverse operation to obtain third sub information 373.
Please refer to fig. 7, which illustrates a third embodiment of creating an item in the reserved memory block 3B in an electronic tag 30 according to the present applicationA method for destroying the password 3B1 and the item access password 3B 2. The reserved block 3B is a 64-bit memory space that stores an item destruction password 3B1 and an item access password 3B2, both of which are parameters of a two-word set that must be established prior to use of the tag 3. in one embodiment, both of these two sets of passwords are retrieved from the tag identifier 31 of the tag 30. In a preferred embodiment, the item destruction password 3B1 and the item access password 3B2 are generated by hashing the tag number 313 of the tag identifier 31. In FIG. 7, the first cryptomask 2271 is a 3-word constant, and the tag number 313 is a 3-word parameter with 48 bits from 0 th to 47 th bits being TagSN [47:0]]Indicating that the AND gate 227 operates from TagSN [47:0] according to the first cipher mask 2271 having bits set to 1 in its 48 bits]The corresponding bit is extracted from the 48 bits and used as the output signal of the AND gate 227. In one embodiment, the tag item processing system 22 sets the first mask 2271 to a 48-bit first mask value of 000000000001HThe tag serial number 313 and the first password mask 2271 are operated by an AND gate 227, and only the 0 th bit TagSN [ 0] corresponding to the second password mask value set to 1 is retrieved from the tag serial number 313]As a subsequent control signal, for input to a 1-bit encoder 228. In a preferred embodiment, the tag item processing system 22 retrieves any bit from the tag serial number 313 as a control signal for the 1-bit encoder 228 by setting the 1 bit set in the 0 th bit of the first password mask 2271 in the second other bit of the first password mask 2271. The encoder 228 has two output signals connected to a Hash Table (Hash Table)229, and the Hash Table 229 has two sets of password setting values. In one embodiment, according to TagSN [ 0]]The output signal of the hash table 229 can be selectively set to be the first password 2291 or the second password 2292 when the TagSN [ 0]]When the number is 0, the hash table 229 outputs a first group of passwords 2291 to obtain that the first item destruction password 3B11 is 00010000HAnd the first item access code 3B21 is 00000001HWhen TagSN [ 0]]When the number is 1, the hash table 229 outputs a second group of passwords 2292 to obtain a second item destruction password 3B12 of 00100000HAnd a firstThe two-item access code 3B22 is 00000010H. In a preferred embodiment, the first password mask 2271 can be set to have any P specific bits as other values with 1, and the AND operation can retrieve any P specific bits from the tag number 313 as the subsequent control signals to be input to an N-bit encoder, which can output 2NSet cipher setting values to generate corresponding 2NThe group item destroy password 3B1 and the item access password 3B 2.
Please refer to fig. 8, which is a schematic diagram illustrating a method for creating a second information table with different arrangement sequences in a memory block of an electronic tag UII according to a third embodiment of the present application. Please refer to FIG. 3, which shows the project information table 33 of the financial credit cash authentication card established by the present application, wherein the project information table is stored in the memory address 480H~5FFHThe second information table 39 includes parameters such as a deposit and withdrawal account 374, a credit card number 376, a credit card password 37A, a temporary counter password 377, a comparison failure number 37E, a deposit and withdrawal password 375, a second encryption key 370, and cash card balance information 378, and the storage addresses of the parameters in the second information table 39 are in an original arrangement order. In a preferred embodiment, the storage addresses of the parameters in the second information table 39 may have different sequences, and the length of the second information table 39 may vary according to different authentication card systems, such as a financial cash authentication card system, a credit cash authentication card system, and a cash authentication card system, so as to prevent illegal eavesdropping and tampering of the cash card balance 379 in the second information table 39. In FIG. 8, the second password mask 22A1 is a 3-word constant with 48 bits set by the system, the tag number 313 is a 3-word parameter with 48 bits from bit 0 to bit 47 of the 3-word parameter, which may be TagSN [47:0]]Indicating that the AND gate 22A operation is based on the TagSN [47:0] bits of the 48 bits of the second cryptomask 22A1 being set to 1]The tag item processing system 22 generates k second information tables 39 with different permutation sequences according to the tag sequence number 313, the second information table 39 and the second password mask 22A1 after the item information table 33 is established1,392,393…,39kWhereink is any number between 1 and 16. In one embodiment, the storage address of each parameter in the second information table 39 is an original arrangement, and the memory address pointer of the original arrangement is [ n, n +1, …, n + m ]]Where n is an address pointer indicating the storage address of the first parameter of the second table 39, m +1 is the alignment adjustment range indicating the number of parameters of the second table 39, the unit length of a parameter may be a 16-bit word, and when the second table 39 is used1Has an address pointer of [ n +1, n +2, …, n + m, n%]It means that the storage address of each parameter in the table is rotated to the right by the unit length of one parameter.
In FIG. 8, the tag item processing system 22 sets the second password mask 22A1 to a 48-bit second password mask value of 00000000000FHThe tag serial number 313 and the second cryptographic mask 22A1 are operated by an AND gate 22A to retrieve only the TagSN [3: 0] of the 4 th bits 0 to 3 corresponding to the second cryptographic mask value set to 1 from the tag serial number 313]As a subsequent control signal, to be inputted to a 4-bit encoder 22B. In a preferred embodiment, a1 set in the 4 th bit from 0 to 3 rd bit of the second password mask 22A1 is set in the other 4 bits of the second password mask 22A1, and the tag item processing system 22 can extract any 4 bits from the tag serial number 313 as the control signal for the 4-bit encoder 22B. The encoder 22B has 16 output signals, each of which is connected to an adjustment Table (Adjust Table)22C as its input signal, each input signal of the adjustment Table 22C has a corresponding set of permutation adjustment operations, the adjustment Table 22C has at most 16 sets of permutation adjustment operations, the permutation adjustment operations include arithmetic, logic, and shift operations of address pointers, such that data in the second data Table is rotated left, rotated right, transposed, or moved to different memory segments or blocks for the tag entry processing system 22 to Adjust the permutation order of each parameter in the second information Table 39, and each tag number 313 can obtain a set of permutation adjustment operations from the adjustment Table 22C. In another preferred embodiment, the tag entry processing system 22 incorporates the encoder 22B into the adjustment table 22C, and the second cryptographic mask 22A1 optionally retrieves a set of N bits from the tag serial number 313 as the adjustment table 22C, the adjustment table 22C contains at most 2NA permutation adjustment operation method is provided.
Please refer to fig. 3 and fig. 8, which illustrate a specific embodiment according to a third embodiment of the present application. In one embodiment, the tag item processing system 22 sets the second password mask 22A1 to a value of 00000000000F when creating an item information tableHThe tag serial number 313 and the second cryptographic mask 22A1 are operated by an AND gate 22A to retrieve only the TagSN [3: 0] from the tag serial number 313 corresponding to the second cryptographic mask value set to 1]As a control signal for the subsequent 4-bit encoder 22C. In one embodiment, when TagSN [3: 0]]Is 0HThe tag item processing system 22 then selects the first set of alignment adjustment operations 22C1 from the adjustment table 22C to generate the second table 39 with the first set of alignments1. In a preferred embodiment, the arrangement adjustment operation 22C1 is to Rotate the storage address of each parameter in the second information table 39 to the Right (Rotate Right) by two words, and the original arrangement of each parameter in the second information table 39 is shown in fig. 3: cash card balance [31:16]Balance of cash card [15:0]…, deposit and withdrawal account number [31:16]]And deposit withdrawal account number [15:0]]The storage address of each parameter may be as follows: 480H、490H、…、5E0HAnd 5F0HIt is shown that the storage address of each parameter in the second information table 39 may be as follows after shifting by two words: 4A0H、4B0H…, and 490HIf it is, the deposit and withdrawal account number [31:16]]Is stored in memory address 480HThe deposit and withdrawal account number [15:0]]Stored at memory address 490HThus, a second information table 39 having a first set of arrangements is generated1. In another preferred embodiment, the alignment adjustment operation method in the adjustment table 22C may include left-shifting or only left-or right-rotating by 1 or other or 0 characters, and may also include other logic operations or no operations, even including adjusting the alignment order of the parameters by characters or digits. In another preferred embodiment, when TagSN [3: 0]]Is 1HThe tag item processing system 22 selects a second set of permutation adjustment operations 22C2 from the adjustment table 22C to generate a tag having a second permutationGroup-arranged second information table 392The group alignment adjustment operation 22C2 is to Rotate the storage address of each parameter in the second information table 39 to the Left (Rotate Left) by two words, and the storage address of each parameter in the second information table 39 is originally aligned as shown in fig. 3, and after being shifted to the Left by two words, the following operations may be performed: 5E0H、5F0H…, and 5D0HIndicating that the cash card is in use state [15:0]]Is stored in memory address 480HThe serial number of the bus station of cash card [15:0]]Stored at memory address 490HThus, a second information table 39 having a second set of arrangements is generated2. In another preferred embodiment, the alignment adjustment method included in the adjustment table 22C may be an operation of moving 1 or other or 0 blocks to the left or right, or other logical operations, such as a Swap operation or a Bit reverse operation on part of the parameters. In a preferred embodiment, the second password mask 22A1 can be other values, and the tag item processing system 22 can optionally retrieve 1-N bits from the tag serial number 313 as the adjustment control signal for the adjustment table 22C, so that the adjustment table 22C contains 2 bits1~2NA group arrangement adjustment operation method. In a preferred embodiment, the memory of the electronic tag can be divided into sections and blocks, and the adjustment table 22C contains at most 2NThe arithmetic, logic, and shift operation method for adjusting the address pointer includes rotating the data in the data table to the left, to the right, swapping the data in one block, or moving the data to different memory blocks or sectors.
In FIG. 8, the 1 st set of arrangement adjustment operations 22C1, the 2 nd set of arrangement adjustment operations 22C2, …, and the 16 th set of arrangement adjustment operations 22C3 have different storage rules, such as the cash card balance, the cash card usage status, the cash card bus stop number, the cash card store number, the cash card commodity number, and the … deposit/withdrawal account number in the second information table 39 are first allocated to the odd-numbered group memory address (480)H~48FH、4A0H~4AFH、4C0H~4CFH、…5E0H~5EFH) Stored sequentially and then according to the even-word memory address (490)H~49FH、4B0H~4BFH、4D0H~4CDH、…5F0H~5FFH) And (5) sequentially storing.
Please refer to fig. 9, which IS a schematic diagram illustrating a method for a radio frequency identification information system (RFID IS)1 to establish an item information table for a user in an electronic tag 3 by using an RFID tag item processing system (RFID TIPS)22 according to the present application. Referring to fig. 3 and 5 to 9, the RFID IS 1 includes a radio frequency identification authentication system (RFID AS)2 and an electronic tag 3, the electronic tag 3 has a tag identifier 31 and a tag memory 34, the tag memory 34 IS distinguishable by memory sections and blocks, the RFID AS 2 includes an RFID TIPS22, the RFID TIPS22 configures an electronic tag data structure T30 and a set of system constants in its working memory, the set of system constants includes a first cipher mask 2271, a second cipher mask 22a1, a first information table length value, a second information table length value, a third information table length value, a hash table 229 and an adjustment table 22C, the electronic tag data structure T30 includes an RM block 3B, TID block 3C, UII block 3D and an UM block 3E, the UII block 3D includes a first memory block 36 and a second memory block 38, the UM block 3E may be a third memory block 3G, the TID block 3C comprises a tag identifier 31, the tag identifier 31 comprises a tag serial number 313 and a manufacturer number 314, the electronic tag data structure T30 stores an item information table 33, the item information table 33 comprises a first information table 35, a second information table 37, a third information table 3E0, an item destruction password 3B1, and an item access password 3B2, the first memory block 36 stores the first information table 35, the second memory block 38 stores the second information table 37, the UM block 3E stores the third information table 3E0, the first information table 35 comprises a first authentication information 350, a first encryption key 352, and first further information 354, the first authentication information 350 comprises an item code 357, a user number 355, the first encryption key 352 comprises an encrypted second sub-information 353, the first another information 354 includes an item number 358 and first PC information 351, the second information table 37 includes second authentication information 371, a second encryption key 370, and second another information 372, and the second authentication information 371 includes deposit/withdrawal moneyA password 375, a temporary cabinet password 377, a cash card balance 379, and a credit card password 37A, the second encryption key 370 includes encrypted third sub-information 373, the second other information 372 includes a deposit and withdrawal account number 374, a credit card number 376, and cash card balance information 378, wherein the item code 357 includes codes for an RFID industry sub-category, an RFID device sub-category, an RFID selective enablement function sub-category, an RFID function sub-category, and an RFID implementation country sub-category, the item number includes numbers for an RFID industry sub-category of an item code 357 organized by its organization, the third information table 3E0 includes a transit number table 3E1, in a preferred embodiment, the third information table 3E0 includes an RFID transit management table 3E2, or a received short message number table 3E3, or a combination thereof, the method includes the steps of S200: configuring an electronic tag data structure T30 in the working memory of the RFID tag item processing system 22, initializing the electronic tag data structure T30 and a set of system constant values, wherein the set of system constant values includes an item information table 33 and each parameter in the item information table 33, the item destruction password 3B1 and the item access password 3B2, and the item information table 33 includes the first information table 35, the second information table 37 and the third information table 3E 0. Step S201: the tag identifier 31 of the electronic tag 30 is read and stored in the tag identifier 31 of the electronic tag data structure T30, and the tag identifier 31 includes a tag serial number 313 and a manufacturer number 314. Step S202: the user is encoded according to the RFID industry sub-category, the RFID device sub-category, the RFID selective enablement function sub-category, the RFID function sub-category, and the RFID implementing country sub-category to generate the item code 357. Step S203: the user is numbered according to the organization sub-category of the RFID industry sub-category to generate the item number 358 and the user number 355. Step S204: encrypting according to the user number 355, the tag serial number 313 and the second sub-information 353 to generate the first encryption key 352, wherein the second sub-information 353 is the length of the second information table, and in a preferred embodiment, the length of the second information table is 24. Step S205: it is assumed that the first PC message 351 contains a system start value, which is the length value of the first message tableIn a preferred embodiment, the first message table length value is 7. Step S206: the values of the parameters or default values in the second information table 37 include the deposit and withdrawal account number 374 and the credit card number 376, and the values of the authentication codes or default values of the second authentication information 371 include the deposit and withdrawal code 375 and the credit card code 37A used in aATM and the bank code 377 used in bank. Step S207: encrypting according to the tag serial number 313 and the third sub-information 373 to generate the second encryption key 370, where the third sub-information 373 is the length of the third information table, and in a preferred embodiment, the second encryption key 370 can be replaced by a received short message number 370. Step S208: according to the tag serial number 313, the first password mask 2271 and the hash table 229, an item destruction password 3B1 and an item access password 3B2 are generated. Step S209: obtaining a set of permutation adjustment operations according to the tag serial number 313, the second password mask 22A1 and the adjustment table 22C to adjust the parameter addresses in the second information table 39 to generate the second information table 39 with different permutationsN. Step S210: obtaining the parameter values of the third information table 3E0, wherein each parameter includes obtaining a transfer account table 3E1 or its predetermined value, in a preferred embodiment, RFID traffic control table 3E2 or its default value of 00000000HThe received short message number table 3E3, or the combination thereof. Step S211: the tag data structure T30 is stored in the tag 30, and the tag data structure T30 includes the first table of information 35, the second table of information 37, the third table of information 3E0, the item destruction password 3B1, and the item access password 3B 2.
Please refer to fig. 10, which IS a schematic diagram illustrating a method of an RFID tag item processing system (RFID ips)22 for a wireless radio frequency identification information system (RFID IS)1 to authenticate an electronic tag 3 using encryption keys and passwords according to a fourth preferred embodiment of the present application. Referring to fig. 3, fig. 5 to fig. 8, and fig. 10, the RFID IS 1 includes a radio frequency identification authentication system (RFID AS)2 and an electronic tag 3, the electronic tag 3 has a tag identifier 31 and a tag memory, the tag memory IS divided by memory sections and blocks, the RFID AS 2 includes an RFIDTIPS22, the RFID TIPS22 comprising a set of system constant values including a first password mask 2271, a second password mask 22a1, a first information table length value, a second information table length value, and an adjustment table 22C, the method as shown in fig. 10 comprising the steps of S301: the RFIDTIPS22 establishes an item information table 33 in the electronic tag 3 according to a plurality of authentication stages, wherein the item information table 33 comprises a first information table 35 and a second information table 39NAnd a third information table 3E0, wherein the first information table 35 includes first authentication information 350, a first encryption key 352, and first other information 354, the first authentication information 350 includes an item code 357 and a user number 355, the first other information 354 includes an item number 358 and first PC information 351, wherein the item code 357 includes a classification code including an RFID industry sub-classification, an RFID device sub-classification, an RFID selective activation function sub-classification, an RFID function sub-classification, and an RFID implementation country sub-classification, and the second information table 39NIncluding second authentication information 371, second encryption key 370, and second other information 372, the second authentication information 371 including a deposit payment password 375, a temporary counter password 377, a cash card balance 379, and a credit card password 37A. Step S302: the RFID industry sub-category, the RFID device sub-category, the RFID selective enabling function sub-category, the RFID function sub-category, and the RFID implementing country sub-category of the electronic tag 3 including the item code 357 are selected and checked according to the item code 357. Step S303: the first information table 35 is read. Step S304: and checking the number of the word groups of the first information table as the length value of the first information table. Step S305: the tag identifier 31 is read, and the tag identifier 31 includes the tag serial number 313 and a manufacturer number 314. Step S306: the first encryption key 352 is decrypted by using the tag serial number 313 and the user number 355 to obtain the second sub-information 353. Step S307: the second sub-information 353 is checked to be the length of the second information table to authenticate the authenticity of the electronic tag 3 and to confirm that the electronic tag 3 belongs to the same system. Step S308: reading the second information table 39 according to the second sub information 353N. Step S309: using the tag number 313, the second password mask 22A1, and the adjustment table 22C to obtain a set of adjustment operations, and performing a reverse adjustmentThe integer (Unadjust) operation to obtain the second information table 37 having the original arrangement. Step S310: the second authentication information 371 is authenticated to use the second other information 372. Step S311: the tag serial number 313 is utilized to decrypt the second encryption key 370 to obtain a third sub-message 373 indicating the length value, i.e. the number of words, of the third message table 3E1, in a preferred embodiment, the second encryption key 370 is replaced by a received short message number 370, and the third sub-message 373 is a default value. Step S312: the third sub information 373 is authenticated to read and use the third information table 3E0, and in a preferred embodiment, the third information table 3E 0.
Please refer to fig. 11, which is a schematic diagram showing the time-varying information for authenticating an electronic tag using a plurality of authentication methods in the first stage of the RFID tag item processing system according to the fifth preferred embodiment of the present invention, in which a user uses a financial credit cash authentication card to transact a deposit and withdrawal transaction in a bank, a bank teller having activated a local computer 222 includes accessing the local computer network environment, setting an RFID environment, and setting a set of system constants, the set of system constants including a computer type CompType set to "temporary counter service computer", a first information table length value, a second information table length value, a maximum comparison failure number, a hash table 229, and an adjustment table 22C, the bank teller having also activated the RFID TIPS 22. Referring to fig. 1, fig. 3, and fig. 11, the method includes step S501: the user presents an electronic label 3. Step S502: the RFID TIPS22 activates the reader 221 and selects an electronic tag via the reader 221 with a Select command according to the RFID industry sub-category, the RFID device sub-category, the RFID selective activation function sub-category, and the RFID function sub-category of the item code 357. in one embodiment, the selected condition is a very high frequency long distance financial credit cash authentication card for financial industry, in a preferred embodiment, the RFID industry sub-category, the RFID device sub-category, the RFID selective activation function sub-category, and the RFID function sub-category of the item code 357 can also Select an electronic tag for other fields with a Select command, and the selected condition is a high frequency short distance financial credit cash authentication card for access industry. Step S503:the RFID TIPS22 inventories the tags with an Inventory directive. Step S504: in one embodiment, the reader 221 checks the card device containing the uhf electronic tag with a Query command, and in a preferred embodiment, the reader 221 checks the card device containing the hf electronic tag with a BeginRound command. Step S505: in one embodiment, the reader 221 requests to query the device reporting the uhf long-range electronic tags by using the QueryRep command, and in a preferred embodiment, the reader 221 requests to query the device reporting the hf short-range electronic tags by using the NewSlot command. Step 506: in one embodiment, the electronic tag 3 meeting the selected condition returns a check code RN1 received by the RFID TIPS22 via the reader 221, the check code RN1 is a 16-bit random code RN161In a preferred embodiment, the check code RN1 is a 16-bit error detection code StoredCRC stored in the electronic tag. Step 507: the RFID TIPS22 attaches the check code RN1 to read the data of the electronic tag 3. Step S508: the reader 221 replies to the electronic tag 3 with the received check code RN 1.
Step S509: after confirming the receipt of the check code RN1, the electronic tag 3 indicates the memory block RB1 according to the first PC message 351, and returns the first message table 35 to be received by the RFID TIPS22 via the reader 221, wherein the first message table 35 comprises the item code 357, the item number 358, the user number 355, the first encryption key 352, the first PC message 351, and the CRC error detection code. Step S510: the RFID TIPS22 verifies that the number of words of the first information table 35 is equal to the "first information table length value"? In a preferred embodiment, the length of the first message table is 7, and if not equal, the step S512 is executed. If equal, it indicates that the verification is passed and proceeds to step S511: the RFID TIPS22 verifies the item code 357, the item number 358, and the user number 355 of the first information table 35 to confirm that the electronic tag 3 and the RFID TIPS22 belong to the same system, and if the verification is not passed, the step S512 is proceeded to end the communication session. If the verification is passed, the authentication method continues as in step S516 of fig. 12. Step S512: the RFID TIPS22 ends the communication session with the electronic tag. Step S513: the reader 221 continues to select the next electronic tag. Step S514: the RFID TIPS22 disconnects communication with the reader 221. Step S515: the reader 221 cuts off the RF power.
Please refer to fig. 12, which is a schematic diagram showing the time-varying information for the RFID tag item processing system 22 using a second phase of a plurality of authentication methods to authenticate an electronic tag according to the present application, which is a continuation of fig. 11. Referring to fig. 1 to 3, fig. 11, and fig. 12, the method includes the following steps S516: the RFID TIPS22 requests the user to enter an authentication password, which is the authentication of the second authentication information 371, using the numeric keypad 223. Step S517: at this time, the bank teller can request the user to show the certificate with the user identification for subsequent comparison, and simultaneously request the user to input an authentication password using the numeric keypad 223 for checking the user identification of the person showing the electronic tag 3. Step S518: the RFID TIPS22 issues a Read command to Read the tag identifier 31. Step S519: the reader 221 requests a new random code from the tag 3 by appending the check code RN1 with a Req _ RN command. Step S520: after confirming the receipt of the handle RN1, the electronic tag 3 sends back to the reader 221 a random code RN2 as a handle for subsequent communication, the random code RN2 is a 16-bit random code RN162And received by the RFID TIPS 22. Step S521: the reader 221 attaches the handle RN2 to read the tag identifier 31 of the electronic tag 3. Step S522: after confirming the receipt of the handle RN2, the electronic tag 3 transmits the tag identifier 31 with the handle RN2 back to the reader 221, and receives the tag identifier 31 from the RFID TIPS22, wherein the tag identifier 31 includes a tag serial number 313 and a manufacturer number. Step S523: the RFID TIPS22 decrypts the first encryption key 352 by using the tag serial number 313 and the user number 355 to obtain the second sub-information 353, wherein the second sub-information 353 is the length value, i.e. the number of words, of the second information table 37. Step S524: checking "the second sub information 353"? If not, step S532 is performed to end the communication session with the electronic tag 3. If yes, go to step S525: the RFID TIPS22 attaches the handle RN2 via the reader 221 to read the second information table 39 of the electronic tag 3 according to the second sub-information 353N. Step S526: the tag 3 will identify the RN2 as the handle, and will then use the second table 39 in the second block 38NThe RN2 is appended and returned to the reader 221. Step S527: receiving the second information table 39NThe second information table 39NIs generated by a set of permutation adjustment operations in fig. 8. Step S528: the RFID TIPS22 uses the tag number 313, the second password mask 22A1, and the adjustment table 22C to obtain a set of alignment adjustment operations for the second information table 39NThe second information table 39 with the original arrangement order is obtained by performing the inverse arrangement adjustment operation, the second information table 39 includes the second encryption key 370 and the second authentication information 371, and the second authentication information 371 includes the deposit and withdrawal password 375, the temporary counter password 377, the cash card balance 379, and the credit card password 37A. Step S529: selecting an authentication information from the second authentication information 371 according to the computer type CompType, which can be aATM, a temporary counter service computer, a workstation, or a smart cash register, in one embodiment, the CompType has been set as "temporary counter service computer" in the present application, then the temporary counter password 377 can be selected from the second authentication information 371 according to the CompType, and then comparing "the authentication information" is "authentication password inputted by user"? If not, the process proceeds to step S536. If yes, go to step S530: the RFID TIPS22 may use the received second table of information 39, the second table of information 39 corresponding to the stored tag memory address 480 of FIG. 3HTo 5FFHThe information of (1). For example, in one embodiment, the RFID TIPS22 uses the deposit and withdrawal account 374 in fig. 3 to establish a connection with a shared database 4 via the network connection device 5 and the internet 6, and only after verifying that it is a database user, can read the user data of the deposit and withdrawal account 374 from the database 4, such as identification code, account name, birthday, address, emergency contact, and phone, for the bank teller to confirm the identity of the user who earlier shows the electronic tag 3. Step S531: after the user identification is confirmed, the bank teller can proceed the subsequent deposit or withdrawal or transfer transaction, and the RFID TIPS22 stores the transaction in a number after the transaction is completedIn the database 4, then, step S532 is performed: the communication session with the electronic tag 3 is ended. Step S533: the reader 221 continues to select the next electronic tag. Step S534: the RFID TIPS22 disconnects the communication with the reader 221. Step S535: the reader 221 cuts off the RF power. Step S536: test "number of failed alignments 37E" ≧ maximum number of failed alignments "? If yes, go to step S539: the tag destruction process is started to prevent the intrusion of the external intelligent system, and then step S532 is performed. If not, go to step S537: the result of increasing the number of failed comparisons 37E by 1 is stored in a register Areg. Step S538: the handle RN2 is attached via the reader 221, the adjusted address pointer for the failed alignment count 37E is obtained by the permutation adjustment operation obtained in step S528, the failed alignment count 37E of the tag 3 is updated to the value of the register Areg by the adjusted address pointer for the failed alignment count 37E, and step S532 is performed to end the communication session with the tag 3.
Please refer to fig. 13, which is a schematic diagram illustrating a time variation of a message of the RFID tag item processing system 22 using a plurality of authentication methods for toll payment according to a sixth preferred embodiment of the present application. In one embodiment, where a user hangs a financial credit cash authentication card in a vehicle or places it in an insertion slot attached to a vehicle for cash deduction through a lane's toll management system, a lane manager has activated a local computer 222 including accessing the local computer network environment, setting the RFID environment, and setting a set of system constants including setting the computer type CompType to "Smart Teller", the first information table length value, the second information table length value, the maximum number of failed comparisons, the hash table 229, and the adjustment table 22C, and the lane manager has also activated the RFID TIPS 22. As shown in fig. 13, step S601 of the method: the user presents a financial cash authentication card by hanging the card in his vehicle or placing the card in an insertion slot attached to the vehicle, and fixing the card in the insertion slot capable of rotating 45 degrees left and right or adjusting 45 degrees upwards to make the RFID TIPS22 and the card set upAnd (5) communication is established. Step S602: the RFID TIPS22 activates the reader 221 and sets the condition for selecting an electronic tag to be a very high frequency long distance financial credit cash authentication card in the financial industry according to the RFID industry sub-classification, the RFID device sub-classification, the RFID selective activation function sub-classification, and the RFID function sub-classification of the item code 357, in one embodiment, the RFID industry sub-classification, the RFID device sub-classification, the RFID selective activation function sub-classification, and the RFID function sub-classification of the item code 357 may be high frequency short distance financial credit cash authentication cards in the access industry. Step S603: the reader 221 issues a condition for selecting the electronic tag 3. Step S604: the RFID TIPS22 inventories the electronic tags via the reader 221. Step S605: the reader 221 issues a query report instruction. Step S606: the electronic tags meeting the selected condition return a check code RN3, which is received by the RFID TIPS22 via the reader 221, the check code RN3 may be a 16-bit random code RN163. Step S607: the RFID TIPS22 replies to the electronic tag 3 with the check code RN3 via the reader 221 to read the information of the electronic tag 3.
Step S608: after the electronic tag 3 confirms the check code RN3, it instructs RB1 to transmit the first information table 35 in the first memory block 36 according to the first PC information 351, and the first information table 35 includes the item code 357, the user number 355, the first PC information 351, and the first encryption key 352, and is received by the RFID TIPS22 via the reader 221. Step S609: the RFID TIPS22 checks that the number of words in the first table 35 is the first table length value, which in a preferred embodiment is 7, and if not equal, then step S624 is entered. If yes, go to step S610: the RFID TIPS22 issues an instruction to read the tag identifier 31. Step S611: the reader 221 attaches the check code RN3 to the electronic tag 31 with a Req _ RN command to request a new random code. Step S612: after the tag 3 verifies the check code RN3, it returns a new random code RN4, which is received by the RFID TIPS22 via the reader 221 as a handle for subsequent communication, which may be a 16-bit random code RN164. Step S613: the reader 221 attaches the handle RN4 to read the handle RNThe tag identifier 31 of the electronic tag 3. Step S614: after the electronic tag 3 confirms the handle RN4, it transmits the tag identifier 31 with the check code RN3, and the tag identifier 31 is received by the RFID TIPS22 via the reader 221, wherein the tag identifier 31 includes a tag serial number 313 and a manufacturer number 314.
Step S615: the RFID TIPS22 decrypts the first encryption key 352 by using the tag serial number 313 and the user number 355 to obtain a second sub-message 353, and if the second sub-message 353 is the same as the length of the second message table, it is determined that the selected electronic tag 3 is not counterfeit and belongs to the same system as the RFID TIPS 22.
Step S616: the RFID TIPS22 attaches the handle RN4 via the reader 221 to read the second information table 39 of the electronic tag 3 according to the second sub-information 353N. Step S617: the tag 3 will acknowledge the handle RN4 and will send the second message to the second message table 39NThe second table of information 39 is sent back via the reader 221 to the RN4 attached to the handle and received by the RFID TIPS22NIs generated by a set of permutation operations in fig. 8.
Step S618: the RFID TIPS22 uses the tag serial number 313, a system setting value second password mask 22A1, and the adjustment table 22C to obtain a set of alignment adjustment operations for the second information table 39NThe second information table 39 with the original arrangement order can be obtained by performing the inverse arrangement adjustment operation, the second information table 39 includes the second encryption key 370 and the second authentication information 371, and the second authentication information 371 includes a cash card balance 379. Step S619: the RFID TIPS22 first deducts the cash consumption amount from the cash card balance 379 to obtain a "deducted cash card balance", and then checks "deducted cash card balance" ≧ 0? If not, step S628 is performed. If so, the step S620 is performed as if the password is successfully compared: the RFID TIPS22 attaches the handle RN4 via the reader 221, obtains the adjusted address pointer of the cash card balance 379 by using the set of permutation adjustment operations obtained in step S618, and updates the cash card balance in the electronic tag 3 to the deducted cash card balance at the adjusted address pointer of the cash card balance 379. Step S621: the electronTag 3 updates the cash card balance 379 to the deducted cash card balance after confirming the handle RN4, and transmits the handle RN4 to the reader 221 after success. Step S622: the reader 221 has successfully updated the cash card balance 379. Step S623: the RFID TIPS22 stores the transaction in the database 4 and performs the processing after the successful deduction including sending a transaction short message or e-mail to the received short message number 370 as a proof, in one embodiment, an RFID automated lane management system can open a fence at a long distance and display or send a passing message in real time, in a preferred embodiment, an RFID automated power management system can start a game machine at a short distance. Step S624: the RFID TIPS22 ends the communication session with the electronic tag 3. Step S625: the reader 221 selects the next electronic tag. Step S626: the RFID TIPS22 disconnects from the reader 221. Step S627: the reader 221 cuts off the RF power. Step S628: the RFID TIPS22 displays on the display 225 that the cash card balance 379 is insufficient. Step S629: the RFID TIPS22 stores the transaction in the database 4 and executes the processing procedure after the money deduction failure, in one embodiment, an RFID automated lane management system can display or send out the message of insufficient balance of the cash card in real time, in a preferred embodiment, an automatic image recognition system (OCR) can obtain a license plate number of the vehicle and store the license plate number, the credit card number, and the time and date in the database 4 for subsequent sending of the bill to the user, and then step S624 is performed, in a preferred embodiment, the RFID automated lane management system can directly prepay a certain amount of cash to give the cash card balance 379 through a prepayment cash prepayment procedure, and can also transmit a transaction short message or e-mail to the receiving short message number 370 as a voucher, and then return to step S619 to perform a money deduction again.
Please refer to fig. 14, which IS a diagram illustrating an RFID tag item processing system (RFID TIPS)22 for a wireless radio frequency identification information system (RFID IS)1 according to a seventh preferred embodiment of the present application, wherein the RFID IS 1 includes a wireless radio frequency identification authentication system (RFID AS)2 and an electronic tag 3, the electronic tag 3 has a tag identifier 31, the RFID AS 2 includes an RFID TIPS22, and the RFID TIPS22 includes a reader 221, a local computer 222, a numeric keypad 223, and a display 225. In fig. 14, the method for using the RFID TIPS22 includes the following steps, step S701: the Operating System of the local computer 222 is activated, in one embodiment, the Operating System is a Tag Operating System (TOS) for financial and cash consumption applications, in another embodiment, the Operating System is a Tag Item Operating System (TIOS) for access and supply chain applications, in another embodiment, the Operating System is a Tag Item Processing Operating System (TIPOS) for logistics and Item level tracking applications, and in another embodiment, the Operating System is a Tag Data Operating System (TDOS) for data Processing applications. Step S702: then establishing a local computer 222 connection, accessing a network environment of the local computer 222, accessing an RFID environment, and setting a set of parameter values of the RFID tag item processing system 22 are performed, wherein establishing the local computer connection includes establishing the local computer and the Internet and wireless mobile network connection via an Internet Service Provider (ISP) including a combination of a wired method, a wireless method, or a wired and wireless method, to access the shared database 4 and transmit short messages or e-mails, the network environment includes the name and code and network address of the local computer 222, the name and code and network address of the other processing system 24, the name and code and network address of the database 4, and the RFID environment includes the location number and conference number of the reader 221, a channel band, a link frequency, a pulse width, and a set of parameters of the RFID tag item processing system 22, Modulation mode, bit transmission speed, number of antenna ports, position number of antenna ports and transmission power thereof, wherein the parameter values of the set of RFID TIPS22 include a set of external parameter values including a local computer type CompType, and a set of internal parameter values including an item processing mode IPMode, a SERVICE type ServiceType, a first password mask value, a second password mask value, a first information table length value, a second information table length value, a third information table length value, a maximum number of comparison failures, an authentication type AuthenticationType, a Hash table 229 and an adjustment table 22C, the IPMode includes an item OPERATION OPERATION, an item SERVICE SERVICE and an item TEST TEST, the CompType includes a cash consumption, a smart cash register, a cabinet SERVICE computer, aATM, nuATM, logistics, a supply chain, door access control, item level tracking, traffic, science and technology, and system reservation purpose, the ServiceType includes a label establishment item, a query label item, an item, a query label, an item, and a SERVICE type, The tag item is modified. Step S703: RFID TIPS22 is activated to validate the network environment, which includes database 4. Step S704: the RFID TIPS22 selects an item processing mode according to the IPMode, and performs step S724 when the IPMode is "OPERATION", and performs step S710 when the IPMode is "TEST", and performs step S705 when the IPMode is "SERVICE": the RFID TIPS22 selects the ServiceType service type, and when the ServiceType is "modification tag item", it performs step S708, when the ServiceType is "query tag item", it performs step S707, and when the ServiceType is "create tag item", it performs step S706: the RFID TIPS22 creates a project information table and a project handler for recording the event in a new electronic tag memory according to the RFID industry sub-category of the project code 357 and the project number 358, and then proceeds to step S709 to end the communication session. Step S707: the RFID TIPS22 queries an electronic tag memory for item information and records the item processing procedure of the event according to the RFID industry sub-category of the item code 357 and the item number 358, including sending a short message or an e-mail to a received short message number 370, and then proceeds to step S709 to end the communication session. Step S708: the RFID TIPS22 modifies the project information table and records the project processing procedures of the event in an electronic tag memory according to the RFID industry subclass of the project code 357 and the project number 358, including sending a short message or email to a receiving short message number 370. Step S709: the RFID TIPS22 ends the communication session with the electronic tag 3.
In fig. 14, the method for using the RFID TIPS22 further includes step S710: the RFID TIPS22 selects a project test classification (TestType) according to the RFID industry sub-classification of the project code 357, the project test classification includes a financial industry and other test industries including entrance guard, supply chain, logistics, project level tracking, transportation, technology, and system reservation industries, when the TestType is "financial industry", the step S711 is performed, and when the TestType is "other test industries", the step S722 is performed: the RFID TIPS22 creates and tests an item information table in an electronic tag memory according to the RFID industry sub-category of the item code 357 and the item number 358 and records an item handler of the event, and then proceeds to step S723 to end the communication session. Step S711: the RFID TIPS22 activates a reader. Step S712: the rfid taps 22 test generates a table of item information in an electronic tag memory. Step S713: the RFID TIPS22 tests to read the item information table. Step S714: the RFID TIPS22 tests to modify the item information table. Step S715: the RFID TIPS22 tests the tag for anti-counterfeiting function. Step S716: the RFID TIPS22 tests the match password function. Step S717: the rfid ips22 tests and adjusts the arrangement order of the second information table. Step S718: the RFID TIPS22 test inversely adjusts the order of the second information table. Step S719: the RFID TIPS22 tests cash-in-cash-out and select-currency functions. Step S720: the RFID TIPS22 test generates a test report function. Step S721: the RFID TIPS22 ends the communication session with the electronic tag. Step S723: the RFID TIPS22 ends the communication session with the electronic tag 3.
In fig. 14, the method for using the RFID TIPS22 further includes step S724: the RFID TIPS22 activating the reader 221 includes setting up the RFID environment. Step S725: the RFID TIPS22 issues selection, inventory, and query reporting instructions based on the item code to read an electronic tag 3. in one embodiment, the electronic tag 3 is a uhf long distance cash credit card, and in a preferred embodiment, the electronic tag 3 is a hf short distance cash credit card. Step S726: the RFID TIPS22 obtains a first table of information 35 meeting the selection criteria, wherein the first table of information 35 includes first PC information 351, a first encryption key 352, a user number 355, an item number 358, an item code 357, and a 16-bit CRC error detection code. Step S727: checking the number of words in the first information table 35 as "first information table length value"? If not, step S735 is performed to end the communication session. If yes, the tag identifier 31 is read and step S728 is performed: the RFID ips22 selects an item application classification according to the RFID industry sub-classification and the comp type of the item code 357, the item application classification includes access control, supply chain, logistics and other application industries, cash consumption, financial and counter service, aATM or nuFAD, if the item application classification is "access control", the step S729 is performed, if the classification is "supply chain", the step S730 is performed, if the item application classification is "logistics and other application industries", the other application industries include item level tracking, traffic, technology, and system reservation industry, the step S731 is performed, if the item application classification is "cash consumption", the step S732 is performed, and if the item application classification is "financial and counter service, aATM, or nuFAD", the step S733 is performed: the rfid taps 22 performs item processing procedures that decrypt the key to verify system, tag authenticity, and enter an authentication password. Step S734: after passing through the plurality of authentication methods, the RFID TIPS22 reads the second information table 37, obtains the deposit and withdrawal account 374 and an authentication information through a reverse adjustment operation, compares the authentication information with the inputted authentication password, and then uses the deposit and withdrawal account 374 to access the database 4 after the comparison is successful, so as to complete the deposit, withdrawal or transfer transaction, and records the item processing procedure of the transaction including transmitting short message or e-mail to a receiving short message number, and then performs step S735 to end the communication session. Step S729: the RFID TIPS22 decrypts the secret key to verify the authenticity of the system and tag for access control, and records the event processing including sending a short message or email to a receiving short message number, and then proceeds to step S735 to end the communication session. Step S730: the RFID TIPS22 performs the item processing procedure for decrypting the key to verify system and tag authenticity for the supply chain, and recording the event includes sending a short message or e-mail to a receiving short message number, and then proceeds to step S735 to end the communication session. Step S731: the RFID TIPS22 decrypts the key to verify system and tag authenticity for logistics and other application industries, and records the event including sending short message or e-mail to a receiving short message number, the other application industries including item level tracking, asset management, etc., and then proceeds to step S735 to end the communication session. Step S732: the RFID TIPS22 decrypts the key to verify system, tag authenticity, and cash card balance sufficient for cash consumption deductions and stored value, and records the transaction processing including sending short message or email to a receiving short message number. Step S735: the RFID TIPS22 ends the communication session with the electronic tag 3.
In the eighth preferred embodiment of the present application, the tagged item processing system 22 creates an item code [15:0] in an electronic tag 30 in the electronic tag 30, not completely in accordance with the method described in FIG. 3]Item number [15:0]]And user number [15:0]]. In one embodiment, the user does not need to use RFID to implement the country sub-category encoding, but still needs RFID industry sub-category, RFID device sub-category, RFID select enable function sub-category, and RFID function sub-category, and in one embodiment, may choose to encode the item [15: 0%]And the item number [15:0]Concatenated to create a 32-bit mechanism identifier [31:0]]E.g. the name of a company or organization, or its code, or its business uniform number [31:0]]The item code [15: 6] originally used as RFID industry sub-class, RFID device sub-class, RFID select enable sub-class, and RFID function sub-class code is also encoded]Changing the 10-bit user number [15: 6] from the 6 th to 15 th bit of the user number 355 by another word or changing the same]To set it. The electronic tag 3 has a tag identifier 31 and a memory, the memory being distinguishable by sections and blocks, the RFID tag item processing system 22 configures an electronic tag data structure T30 and a set of system constants in its working memory, the set of system constants including a first password mask 2271, a second password mask 22a1, a first table length, a second table length, a computer type, an authentication type, a hash table 229, and an adjustment table 22C, the electronic tag data structure T30 includes an RM block 3B, TID block 3C, UII block 3D and an UM block 3E, the UII block 3D includes a first memory block 36 and a second memory block 38, the UM block 3E may be a third memory block 3G, the TID block 3C includes a tag identifier 31, the tag identifier 31 includes a tag sequence number 313 and a tag sequence number, and a memory number, the tag identifier 31 includes a tag sequence number and a tag sequence number, and the tag sequence number are assigned to the RFID tag item processing system 22a working memory, the electronic tag dataA manufacturer number 314, the electronic tag data structure T30 storing an item information table 33 according to a plurality of authentication stages, the item information table 33 comprising a first information table 35, a second information table 37, an item destruction password 3B1, and an item access password 3B2, the first memory block 36 storing the first information table 35, the second memory block 38 storing the second information table 37, the UM block 3E storing the third information table 3E0, the first information table 35 comprising a mechanism identifier, a first encryption key 352, first PC information, and a user number 355, the first PC information comprising a first information table 35 length value, the first encryption key 352 comprising a second sub-information 353, the second sub-information 353 being a length value of the second information table 37, in a preferred embodiment, the first information table 35 further comprising an item expiration Date (ItemEx Date) for the TIPS22 to verify, the second information table 37 comprises second authentication information 371, a short message receiving number 370, and second other information 372, the second authentication information 371 may comprise a user password, the short message receiving number 370 may comprise a mobile phone number of a user or other person, and the second other information 372 may comprise an RFID access control table, which is used in the second memory block 38 for centrally managing access to a plurality of controlled access zones and activating electrical equipment of the zones, for example, an RFID authentication system may centrally manage access and assets of cross-country, regional, and city enterprises, or centrally manage controlled access zones of hundreds of rooms of a visiting industry hotel and activation of electrical equipment of the zones, the controlled access zones include controlled access zones using gymnasiums, visitors, archives, and parking lots, or centrally managing controlled access zones of administrative, education, and development institutions and activation of electrical equipment of the zones, the regulated door exclusion zones include use offices, laboratories, research rooms, conference rooms, and training classrooms. In the centralized management access control system, the activation signal of each restricted access zone corresponds to one bit in the RFID access control list. When the corresponding bit is 1, it indicates that the user is authorized to pass through and enter the restricted area of the control gate, and the electric equipment required for starting, displaying and recording the passing through area includes transmitting a short message to a short message receiving number 370, the electric equipment packageWhen the corresponding bit is 0, it indicates that the vehicle cannot pass and enter the restricted area of the control gate, and the electric equipment that can start, display and record the restricted area can transmit a short message to a receiving short message number 370. In a preferred embodiment, the RFID traffic control table may further use other memory blocks or sections of the electronic tag, such as the UM block, as a centralized management of traffic in more restricted access zones and activation of electrical equipment. The method for the TIPS22 to build a project information table 33 on an electronic tag 30 according to a plurality of authentication phases includes: the RFID TIPS22 configures an electronic tag data structure T30 and a set of system constant values in its working memory, initializes the electronic tag data structure T30, the electronic tag data structure T30 stores an item information table 33, each parameter in the item information table 33, the item destruction password 3B1, and the item access password 3B2 according to a plurality of authentication stages, the item information table 33 includes the first information table 35 and the second information table 37. The RFID TIPS22 reads the tag identifier 31 of the electronic tag 30 and stores the tag identifier 31 in the electronic tag data structure T30, which includes the tag serial number 313 and the manufacturer number 314. The rfid taps 22 generates the establishment identifier by the name of the user company or establishment, or its code, or its business. The RFID TIPS22 encodes the user according to the RFID industry, the RFID device, the RFID selective enablement function sub-category, and the RFID function sub-category to generate the user number 355. The RFID TIPS22 sets the item expiration date to have a validity period. The RFID TIPS22 encrypts according to the user number 355, the tag serial number 313, and the second sub-information 353 to generate the first encryption key 352, wherein the second sub-information 353 is the length of the second information table. The RFID TIPS22 sets the first PC information 351 to include a system start value, which is the first information table length value, which in a preferred embodiment is 7. The RFID TIPS22 obtains the values of the parameters in the second information table 37, including the user password and the RFID tag of the userAnd managing to control the set values of all the bits. The RFID TIPS22 generates the item destruction password 3B1 and the item access password 3B2 according to the tag serial number 313, the first password mask 2271, and the hash table 229. Obtaining a set of permutation adjustment operations according to the tag serial number 313, the second password mask 22A1 and the adjustment table 22C, adjusting each parameter address of the second information table 39, generating the second information table 39 with different permutationsN. The rfid taps 22 stores the electronic tag data structure T30 to the electronic tag 30, the electronic tag data structure T30 includes the first table of information 35, the second table of information 37, the third table of information 3E0, the item destruction password 3B1, and the item access password 3B 2. The method of the tag item processing system 22 using the electronic tag 30 includes: the tag item operating system of the local computer is started. Then, the local computer connection is established, a local computer network environment, a wireless radio frequency identification environment are accessed, and a set of system parameter values including the location number of the reader 221, the computer type and the authentication type are initialized, wherein the computer type is access control and the authentication type is access control authentication. In another preferred embodiment, the authentication category further includes logistics authentication and supply chain authentication. The tagged item processing system 22 is launched to confirm the local computer network environment. The RFID TIPS22 activates the reader 221, which includes setting the RFID environment. The RFID TIPS22 selects the electronic tag 30 based on the mechanism identifier. The RFID TIPS22 reads the first table of information 35 of the electronic tag 30 containing the user number 355 and the item expiration date. The RFID TIPS22 reads that the tag identifier 31 includes the tag serial number 313. The length value of the first information table 35 and the item deadline are checked. The RFID TIPS22 decrypts the first encryption key 352 using the tag serial number 313 and the user number 355 to obtain the second sub-information 353. The RFID TIPS22 checks the second sub-information 353 to authenticate the authenticity of the electronic tag and to confirm that it belongs to the same system as the electronic tag 3. The RFID TIPS22 reads the second information table 39. The RFID TIPS22 undergoes an inverse adjustment operation to obtain the originally arranged second information table 37. Authenticating the second authentication information 371 includes selecting an authenticationThe second other information 372 can be used after the authentication information is compared with the authentication password input by the user, and the comparison mode includes comparing the bit value corresponding to the reader position number in the RFID passing control table as "1"? If the short message number is not equal, the electric equipment in the restricted area of the restricted door is not opened, and the condition is displayed that the user does not authorize to enter the local area and is recorded, wherein the short message number 370 is transmitted to the electric equipment in the restricted area of the restricted door.
In a ninth preferred embodiment of the present application, the TIPS22 establishes an item code [15:0], an item number [15:0], and a user number [15:0] on an electronic tag 30 in a manner not consistent with the method described in FIG. 3. In one embodiment, the user does not need the RFID industry sub-category code and the RFID implementation country sub-category code, but still needs the RFID device sub-category, the RFID selective enablement function sub-category, and the RFID function sub-category, and in a preferred embodiment, the item code [15:0] and the item number [15:0] are optionally concatenated to create a 32-bit cell identifier [31:0], such as the name of a cell or community, or its code, or its business uniform number [31:0], while the item code [12:6], originally used as the RFID device sub-category, the RFID selective enablement function sub-category, and the RFID function sub-category code, is modified by another word or by a 7-bit user number [15:9] that is between 9 th and 15 th bits of the user number 355. The electronic tag 3 has a tag identifier 31 and a memory, the memory being distinguishable by sections and blocks, the RFID TIPS22 configuring an electronic tag data structure T30 and a set of system constants in its working memory, the set of system constants including a first password mask 2271, a second password mask 22a1, a first table length value, a second table length value, and a hash table 229, the electronic tag data structure T30 including RM block 3B, TID block 3C, UII block 3D, and UM block 3E, the UII block 3D including first memory block 36 and second memory block 38, the UM block 3E being a third memory block 3G, the TID 3C including a tag identifier 31, the tag identifier 31 including a tag sequence number 313 and a manufacturer number 314, the electronic tag data structure T30 storing an item information table 33 according to a plurality of authentication stages, the item information table 33 comprises a first information table 35, a second information table 37, a third information table 3E0, an item destroy password 3B1, and an item access password 3B2, the first memory block 36 stores the first information table 35, the second memory block 38 stores the second information table 37, the UM block 3E stores the third information table 3E0, the first information table 35 comprises a cell identifier, a first encryption key 352, first PC information 351, and a user number 355, the first PC information 351 comprises a first information table 35 length value, the first encryption key 352 comprises a second sub-information 353, the second sub-information 353 is a length value of the second information table 37, in a preferred embodiment, the first information table 35 further comprises an item expiration date for verification by the TIPS22, the second information table 37 comprises a received profile number 370 and a second further information 372, the received short message number 370 may be a mobile phone number of a user or others, and the second other information 372 includes an activation control table. In one embodiment, the enable control table may have only a 16-bit word, each bit being used as a pass enable signal for a restricted access zone. When the corresponding bit is 1, it indicates that the card holder is authorized to pass and enter the restricted area of the control gate, and the electric equipment that can be started and displayed to pass the area includes transmitting a short message to a receiving short message number 370, and the electric equipment includes a lane fence machine, a rolling door, a warning light, an alarm, an electronic lock, a lighting lamp, a display for controlling gate access message, or other electric equipment in the area, when the corresponding bit is 0, it indicates that the card holder can not pass and enter the restricted area of the control gate, and the electric equipment that can not be started and displayed to pass the area includes transmitting a short message to a receiving short message number 370. In one embodiment, the start control table can be used in an RFID access control system for a community and small and medium-sized enterprises, wherein the controlled access areas include a community gate access, a building conference room access, a building office access, a building library access, a building gymnasium access, a building multimedia entertainment room access, a building elevator starter, an underground lane fence starter, and the like. The method for establishing a project information table 33 in an electronic tag 30 according to a plurality of authentication stages by the TIPS22 includes: the RFID TIPS22 configures an electronic tag data structure T30 and a set of system constant values in its working memory, initializes the electronic tag data structure T30, which includes a project information table 33, each parameter in the project information table 33, the project destruction password 3B1, and the project access password 3B2, the project information table 33 including the first information table 35 and the second information table 37. The RFID TIPS22 reads the tag identifier 31 of the electronic tag 30 and stores the tag identifier 31 in the electronic tag data structure T30, which includes the tag serial number 313 and the manufacturer number 314. The RFID TIPS22 generates the cell identifier according to the name of the user's cell or small business (SME), or its code, or its business uniform number. The RFID TIPS22 encodes the user according to the RFID device, RFID selection enabled function sub-category, and the RFID function sub-category to generate the user number 355. The RFID TIPS22 sets the item expiration date, before which the electronic tag is valid. The RFID TIPS22 encrypts according to the user number 355, the tag serial number 313, and the second sub-information 353 to generate the first encryption key 352, wherein the second sub-information 353 is the length of the second information table. The RFID TIPS22 sets the first PC information 351 to include a system start value, which is the first information table length value, which in a preferred embodiment is 7. The RFID TIPS22 obtains the parameter values in the second information table 37, which includes the start control table setting values. The RFID TIPS22 generates the item destruction password 3B1 and the item access password 3B2 according to the tag serial number 313, the first password mask 2271, and the hash table 229. The RFID TIPS22 stores the electronic tag data structure T30 to the electronic tag 30, the electronic tag data structure T30 includes the first table of information 35, the second table of information 37, the third table of information 3E0, the item destruction password 3B1, and the item access password 3B 2. The method for using the electronic tag 30 by the TIPS22 includes: the tag item operating system of the local computer is started. Then, the local computer connection is established, the local computer network environment, the RFID environment are accessed, and a set of system parameter values including the location number of the reader 221 is initialized. The tagged item processing system 22 is initiated to validate the local computer network environment. The RFID TIPS22 activates the reader 221, which includes setting the RFID environment. The RFID TIPS22 selects the electronic tag 30 based on the cell identifier. The RFID TIPS22 reads the first table of information 35 of the electronic tag 30 containing the user number 355 and the item expiration date. The RFID TIPS22 reads that the tag identifier 31 includes the tag serial number 313. The RFID TIPS22 checks the length value of the first table of information 35 and the item expiration date. The RFID TIPS22 decrypts the first encryption key 352 using the tag serial number 313 and the user number 355 to obtain the second sub-information 353. The RFIDTIPS22 checks the second sub-information 353 to authenticate the authenticity of the electronic tag and to confirm that it belongs to the same system as the electronic tag 3. The RFID TIPS22 reads the second information table 37. The RFID TIPS22 uses the second other information 372 including comparing "the corresponding bit value of the reader location number in the start control table"? If they are equal, the electric equipment in the restricted area of the controlled gate is started, and the event is recorded by transmitting short message to the short message receiving number 370, if they are not equal, the electric equipment in the restricted area of the controlled gate is not started, and the event is displayed as "no authorization to enter the local area" and recorded by transmitting short message to the short message receiving number 370.
While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.
Description of the reference numerals
1: radio frequency identification information system 2: radio frequency identification authentication system
(RFID IS) (RFID AS)
3: electronic tag 4: database
5 network connection device 6 Internet
7 wireless mobile network device
Network connection 22 RFID tag item processing System 21
(RFID TIPS)
23 network connection 24 other processing system
30 electronic tag 31 tag identifier
Item information table 34 tag memory
35 first information table 36 first memory block
37 second information table 38 second memory block
39 second information table 3B reserved memory Block
3C, tag identifier memory block 3D, unique item identifier memory block
3E user memory block, 3G third memory block
3J antenna 3K interface and communication control circuit
221 reader 222 local computer
223 numeral keyboard 224 antenna
225 display 226 wireless radio frequency identification information channel
227 AND gate 228 1 bit encoder
229 Hash Table 22A AND gate
22B 4 bit encoder 22C adjustment Table (Adjust Table)
22D reader connecting line 22E numeric keyboard connecting line
22F display connecting line 313 label serial number
314 manufacturer number 350 first authentication information
351 first PC information 352 first encryption key
353 second sub-information 354 first further information
355 user number 357 item code
358 item number 370 second encryption key
371 second authentication information 372 second other information
373, third sub-information 374, deposit and withdraw account number
375 deposit and withdrawal password 376 credit card number
377 cabinet-facing password 378 cash card balance information
379 balance of cash card 37A and cipher of credit card
37E, number of failed comparisons 37F, balance of cash card
37G cash card store code 37I cash card commodity number
37J number of bus stop for cash card 37K number of use state of cash card
3B1 item destroy password 3B2 item access password
3E0 third information Table 3E1 transfer account table
3E2 RFID passing control table 3E3 short message number receiving table
RB1 read memory Block 1 RB2 read memory Block 2
RB3 read memory Block 3T 30 electronic tag data Structure

Claims (17)

1. A processing system for securing an electronic tag, wherein the electronic tag is to be authenticated in an authentication phase and stores an encryption key and a first information table, the first information table having an information table length value, the encryption key being obtained from the information table length value and containing sub-information, the processing system comprising:
a computer; and
a reader electrically connected to the computer, wherein:
in the authentication phase, by using the reader, the computer performs an authentication operation to authenticate the electronic tag, wherein the authentication operation decrypts the encryption key to determine whether the sub-message represents the message table length value;
when the authentication operation determines that the sub-information represents the length value of the information table, the computer confirms that the electronic tag passes the authentication operation; and
after the electronic tag passes the authentication operation, the computer reads the first information table according to the information table length value by using the reader.
2. The processing system of claim 1, further comprising:
a keyboard electrically connected to the computer; and
a display electrically connected to the computer, wherein:
the computer controls the reader, the keyboard and the display and communicates with the electronic tag through the reader;
the electronic tag comprises a tag memory and is provided with a user;
the tag memory stores tag identifiers and item information tables;
the tag identifier comprises a tag serial number and a manufacturer number;
the project information table comprises a second information table, the first information table, a project destroying password, a project access password and a specific part;
the second information table contains first authentication information, the encryption key, and first other information;
the first authentication information comprises a project code, a user number and a project deadline;
the first other information includes an item number and protocol control information;
the first information table comprises a first plurality of information units with a first total information unit number, wherein the information table length value is equal to the first total information unit number;
the first plurality of information units comprise second authentication information, a first short message receiving number and second other information and are arranged according to a first arrangement sequence;
the first received short message number is to be used by the processing system to link to a specific external device, wherein the specific external device is a mobile device;
the second other information comprises a startup control table;
the specific part of the item information table has application encoding information and contains at least one of the second authentication information and the second other information;
the processing system provides a third information table and a set of system constants, wherein the set of system constants comprises a computer type, a system number, an authentication type, a length value of the information table, a first password mask, a second password mask, a hash table and an adjustment table;
the sub information represents the information table length value;
the electronic tag is applied to a specific application function performed by the processing system;
the specific application function comprises at least one of a financial function, an entrance guard control function, a cash consumption function, a credit card function, a temporary counter service function, a traffic charge function, a communication function, a logistics function, a production management function, a work attendance management function, an authentication function, a commodity sale management function, a parking charge function, a supply chain function, a project level tracking function, an asset management function and a combination thereof;
in the establishing stage, the processing system establishes the project information table and writes the project information table to the electronic tag;
the processing system performing the application-specific function by using the item code;
in an authentication phase after the establishment phase, the processing system authenticates the electronic tag; and
after the authentication stage, the processing system generates a transaction message for the specific application function according to the application coding information and transmits the transaction message to the specific external device according to the first short message receiving number.
3. The processing system of claim 2, wherein:
the third information table is an original information table and comprises a second plurality of information units with a second total number of information units, wherein the second total number of information units is equal to the first total number of information units, the information content of the second plurality of information units is identical to the information content of the first plurality of information units, and the second plurality of information units are arranged according to a second arrangement order different from the first arrangement order;
in the establishing stage, the processing system sets the first information table according to the tag serial number, the first password mask and the third information table, wherein:
the tag sequence number has a binary value with M bits, where M > 1;
the processing system selecting N bits from the M bits to generate a first value based on the first cryptographic mask, wherein N > 1;
the processing system encodes the first value to generate a control signal; and
the processing system adjusts the second arrangement sequence by performing an arrangement adjustment operation according to the adjustment table, the third information table and the control signal to generate the first information table;
the authentication operation reads the second information table of the electronic tag and decrypts the encryption key to determine whether the sub-information represents the length value of the information table; and
after the processing system reads the first information table, the processing system converts the first information table into a fourth information table by performing a reverse permutation adjustment operation according to the tag serial number, the first password mask and the first information table, wherein:
the fourth information table comprises a third plurality of information units;
the information content of the third plurality of information units is the same as the information content of the second plurality of information units;
the third plurality of information units are arranged according to a third arrangement order that is the same as the second arrangement order; and
the processing system executes the inverse permutation adjustment operation according to the adjustment table, the first information table and the control signal to generate the fourth information table.
4. The processing system of claim 2, wherein:
the second authentication information further comprises the cash card balance contained in the application coding information;
the specific application function is the cash consuming function and is performed by using the cash card balance;
before the establishing stage, the processing system presets the first short message receiving number by using a default number;
in the establishing stage, the processing system sets the first short message receiving number by receiving a first user input;
the processing system updates the cash card balance by executing the specific application function to form a cash card balance update;
the processing system generates the transaction message according to the cash card balance update so as to transmit the transaction message to the specific external device; and
after the electronic tag is authenticated as genuine to belong to the same system as the processing system, the processing system replaces the first received short message number with a second received short message number intended by the user by receiving a second user input from the user at a time intended by the user.
5. The processing system of claim 2, wherein:
the computer is a local computer;
the electronic tag is a wireless radio frequency identification tag;
the reader comprises a reader antenna, a first interface and a communication control circuit, wherein the first interface and the communication control circuit are electrically connected to the reader antenna, and the reader antenna comprises at least one of a first ultrahigh frequency antenna and a first high frequency induction coil;
the electronic tag further comprises a tag antenna, a second interface and a communication control circuit, wherein the second interface and the communication control circuit are electrically connected to the tag antenna and the tag memory, and the tag antenna comprises at least one of a second ultrahigh frequency antenna and a second high frequency induction coil;
the starting control table comprises a plurality of bits and is contained in the application coding information, and the bits respectively correspond to a plurality of starting signals;
the specific application function is the entrance guard control function and is executed by using the starting control table to control the electric equipment of a specific restricted entrance forbidden zone, wherein the specific restricted entrance forbidden zone is used for controlling one of the user and the application device with the electronic tag;
the plurality of bits include a specific bit used to control a specific enable signal among the plurality of enable signals, wherein the specific enable signal controls the electrical appliance to determine whether the one of the user and the application device is allowed to enter the specific restricted zone;
the specific bit represents one of an authorized state and an unauthorized state;
when the specific bit represents the authorized state, the processing system enables the user or the application device to be allowed to enter the specific restricted access zone by executing the specific application function;
when the specific bit represents the unauthorized state, the processing system enables one of the user and the application device to be forbidden to enter the specific control gate forbidden zone by executing the specific application function;
the processing system generates the transaction message according to the specific bit to transmit the transaction message to the specific external device;
in the establishing stage, the processing system sets the item code according to a predetermined radio frequency identification function combined with the electronic tag, wherein:
the predetermined RFID function includes at least one of the financial function, the credit card function, the temporary counter service function, the cash consumption function, the short message transmission function, the cash balance selection function, the entrance guard control function, the project tracking function, the specific UHF access distance application function, the specific HF access distance application function, and the combination thereof,
the specific UHF access distance application function is a passive UHF long access distance application function, a passive UHF short access distance application function with a relatively high memory capacity, a high frequency short access distance application function, a semi-passive UHF long access distance application function for positioning when the electronic tag is moving, one of a semi-passive uhf long access distance application function with a relatively high memory capacity, a passive uhf long access distance application function for positioning, a passive uhf long access distance application function with a relatively high memory capacity, a passive uhf near access distance application function, and a passive uhf near access distance application function with a relatively high memory capacity, and a combination thereof.
The specific high frequency access distance application function is one of a high frequency short access distance application function, a high frequency short access distance application function with a relatively high memory capacity, a passive high frequency short access distance application function for access control and positioning, and a passive high frequency short access distance application function with a relatively high memory capacity;
in the establishing stage, the processing system sets the encryption key by using a specific operation according to the sub-information and at least one of the tag serial number and the user number, wherein:
the specific operation is one of a first operation, a second operation, a third operation, and a fourth operation,
the first operation sets the encryption key equal to a first sum of the tag number, the user number and the sub-information,
the second operation sets the encryption key equal to a second sum of the tag number and the sub-information,
the third operation sets the encryption key equal to a result obtained from an arithmetic operation applied to the sub information and at least one of the tag number and the user number, and
the fourth operation extracts a certain number of bits from a selected one of the first sum, the second sum, and the result to generate a binary value and sets the encryption key equal to the binary value; and
the processing system is a radio frequency identification tag item processing system.
6. The processing system of claim 2, wherein:
the tag memory further stores measurable parameter information contained in the application code information, wherein the measurable parameter information includes at least one of a usage time, a distance, a weight, a flow rate, a cash card balance, a bus station number of mass transit, and a landing place number of a flight route;
the specific application function is the traffic charging function and is performed by using the measurable parameter information;
the processing system converts the measurable parameter information into a charge amount for transaction by executing the specific application function, and generates the transaction message according to the transaction to transmit the transaction message to the specific external device;
the processing system further provides system messages, and the transaction messages are generated based on the system messages;
in the establishing stage, the processing system sets the item destroying password and the item access password according to the label serial number, the second password mask and the hash table;
the tag sequence number has a binary value with M bits, where M > 1;
the item destruction password and the item access password are set in one of a first state and a second state, wherein:
when the item destruction password and the item access password are set in the first state:
the processing system selecting particular bits from the binary values to produce a first value based on the second cryptographic mask;
the processing system encodes the first value to generate a first control signal;
when the first control signal represents an odd number, the processing system executes a first encryption operation according to the hash table and the odd number to generate a first destruction password value and a first access password value, and sets the item destruction password and the item access password to be respectively equal to the first destruction password value and the first access password value; and
when the first control signal represents an even number, the processing system executes a second encryption operation according to the hash table and the even number to generate a second destroy password value and a second access password value, and sets the item destroy password and the item access password to be respectively equal to the second destroy password value and the second access password value; and
when the item destruction password and the item access password are set in the second state:
the processing system selecting N bits from the M bits to generate a second value based on the second cryptographic mask, wherein N > 1;
the processing system encodes the second value to generate a second control signal;
the processing system executes a third encryption operation according to the hash table and the second control signal to generate a third destroy password value and a third access password value; and
the processing system sets the item destruction password and the item access password equal to the third destruction password value and the third access password value, respectively.
7. An electronic tag to be authenticated by a processing system in an authentication phase, comprising:
the tag memory stores an encryption key and a first information table, wherein:
the first information table has an information table length value;
the encryption key is obtained from the length value of the information table, contains sub-information, and is decrypted by an authentication operation executed by the processing system in the authentication stage to authenticate the electronic tag;
the authentication operation decrypts the encryption key to determine whether the sub-message represents the length value of the message table;
when the authentication operation determines that the sub-information represents the length value of the information table, the processing system confirms that the electronic tag passes the authentication operation; and
after the electronic tag passes the authentication operation, the processing system reads the first information table according to the length value of the information table.
8. The electronic tag of claim 7, wherein:
the electronic tag has a user;
the tag memory stores tag identifiers and item information tables;
the tag identifier comprises a tag serial number and a manufacturer number;
the project information table comprises the first information table, the second information table, a project destroying password, a project access password and a specific part;
the second information table contains first authentication information, the encryption key, and first other information;
the first authentication information comprises a project code, a user number and a project deadline;
the first other information includes an item number and protocol control information;
the first information table comprises a first plurality of information units with a first total information unit number, wherein the information table length value is equal to the first total information unit number;
the first plurality of information units comprise second authentication information, a first short message receiving number and second other information and are arranged according to a first arrangement sequence;
the second other information comprises a startup control table;
the specific part of the item information table has application coding information;
the sub information represents the information table length value;
the first received short message number is used by the processing system in communication with the electronic tag to link to a specific external device;
the electronic tag is applied to an application-specific function, wherein the application-specific function is executed by encoding information using the application;
the item code is associated with the particular application function; and
after the authentication phase, the application code information is used to generate a transaction message for the specific application function, and the first received short message number is used to transmit the transaction message to the specific external device.
9. The electronic tag of claim 8, wherein:
the first information table is configured according to the tag serial number, a first password mask and a third information table, wherein the third information table comprises a second plurality of information units with a second total number of information units, the second total number of information units is equal to the first total number of information units, the information content of the first plurality of information units is identical to the information content of the second plurality of information units, and the second plurality of information units are arranged according to a second arrangement order different from the first arrangement order;
the encryption key is set according to the sub-information and at least one of the label serial number and the user number;
the item destruction password and the item access password are set according to the label serial number, the second password mask and the hash table;
after the authentication phase, the first information table is converted into a fourth information table according to the tag serial number, the first password mask and the first information table, wherein the fourth information table comprises a third plurality of information units, the third plurality of information units are respectively identical to the second plurality of information units, and the third plurality of information units are arranged according to a third arrangement order identical to the second arrangement order.
10. The electronic tag of claim 8, wherein:
the second authentication information includes a cash card balance included in the application code information;
the specific application function is a cash consumption function and is performed by using the cash card balance;
the first short message receiving number is preset by using a default number before the establishing stage;
in the setup phase, the first received short message number is set by receiving a first user input;
by executing the specific application function, the cash card balance is updated to form a cash card balance update;
generating the transaction message to transmit the transaction message to the specific external device according to the cash card balance update; and
after the electronic tag is authenticated as being genuine to belong to the same system as the processing system, the first received short message number is replaced with a second received short message number intended by the user by receiving a second user input from the user at a time intended by the user.
11. The electronic tag of claim 8, wherein:
the electronic tag is a wireless radio frequency identification tag;
the processing system is a radio frequency identification tag item processing system;
the starting control table comprises a plurality of bits and is contained in the application coding information, and the bits respectively correspond to a plurality of starting signals;
the specific application function is an entrance guard control function and is executed by using the starting control table to control the electric equipment of a specific restricted entrance forbidden zone, wherein the specific restricted entrance forbidden zone is used for controlling one of the user and the application device with the electronic tag;
the plurality of bits include a specific bit used to control a specific enable signal among the plurality of enable signals, wherein the specific enable signal controls the electrical appliance to determine whether the one of the user and the application device is allowed to enter the specific restricted zone;
the specific bit represents one of an authorized state and an unauthorized state;
when the specific bit represents the authorized state, by executing the specific application function, the one of the user and the application device is allowed to enter the specific restricted access zone;
when the specific bit represents the unauthorized state, by executing the specific application function, the one of the user and the application device is prohibited from entering the specific restricted access zone; and
according to the specific bit, the transaction message is generated to transmit the transaction message to the specific external device.
12. A method for securing an electronic label, comprising the steps of:
providing the electronic tag, wherein the electronic tag is to be authenticated in an authentication stage, and stores an encryption key and a first information table, wherein the first information table has an information table length value, and the encryption key is obtained from the information table length value and contains sub information;
in the authentication stage, performing an authentication operation to authenticate the electronic tag, wherein the authentication operation decrypts the encryption key to determine whether the sub-message represents the message table length value;
when the authentication operation determines that the sub-information represents the length value of the information table, the electronic tag is confirmed to pass the authentication operation; and
after the electronic tag passes the authentication operation, reading the first information table according to the length value of the information table.
13. The method of claim 12, wherein:
the electronic tag comprises a tag memory and is provided with a user;
the tag memory stores tag identifiers and item information tables;
the tag identifier comprises a tag serial number and a manufacturer number;
the project information table comprises a second information table, the first information table, a project destroying password, a project access password and a specific part;
the second information table contains first authentication information, the encryption key, and first other information;
the first authentication information comprises a project code, a user number and a project deadline;
the first other information includes an item number and protocol control information;
the first information table comprises a first plurality of information units with a first total information unit number, wherein the information table length value is equal to the first total information unit number;
the first plurality of information units comprise second authentication information, a first short message receiving number and second other information and are arranged according to a first arrangement sequence;
the first received short message number is to be used to link to a specific external device, wherein the specific external device is a mobile device;
the second other information comprises a startup control table;
the specific part of the item information table has application encoding information and contains at least one of the second authentication information and the second other information;
the method further comprises the steps of: providing a third information table and a set of system constants, wherein the set of system constants comprises a computer type, a system number, an authentication type, a length value of the information table, a first password mask, a second password mask, a hash table and an adjustment table;
the sub information represents the information table length value;
the electronic tag is applied to a specific application function;
the specific application function comprises at least one of a financial function, an entrance guard control function, a cash consumption function, a credit card function, a temporary counter service function, a traffic charge function, a communication function, a logistics function, a production management function, a work attendance management function, an authentication function, a commodity sale management function, a parking charge function, a supply chain function, a project level tracking function, an asset management function and a combination thereof; and
the method further comprises the following steps:
in the establishing stage, establishing the project information table, and writing the project information table to the electronic tag;
performing the application-specific function by using the item code;
authenticating the electronic tag in an authentication phase following the establishment phase;
after the authentication phase, generating a transaction message for the specific application function according to the application coding information; and
transmitting the transaction message to the specific external device according to the first received short message number.
14. The method of claim 13, wherein:
the third information table is an original information table and comprises a second plurality of information units with a second total number of information units, wherein the second total number of information units is equal to the first total number of information units, the information content of the second plurality of information units is identical to the information content of the first plurality of information units, and the second plurality of information units are arranged according to a second arrangement order different from the first arrangement order;
the step of creating the project information table comprises the substeps of: setting the first information table according to the label serial number, the first password mask and the third information table;
the tag sequence number has a binary value with M bits, where M > 1;
the substep of creating the first information table comprises the substeps of:
selecting N bits from the M bits to produce a first value based on the first cryptographic mask, wherein N > 1;
encoding the first value to generate a control signal; and
adjusting the second arrangement sequence by performing an arrangement adjustment operation according to the adjustment table, the third information table and the control signal to generate the first information table;
the step of performing the authentication operation comprises the substeps of:
reading the second information table of the electronic tag; and
decrypting the encryption key to determine whether the sub-message represents the message table length value;
the method further comprises the steps of: converting the first information table into a fourth information table by performing a reverse permutation adjustment operation according to the tag serial number, the first password mask and the first information table;
the fourth information table comprises a third plurality of information units, wherein the information content of the third plurality of information units is the same as the information content of the second plurality of information units, and the third plurality of information units are arranged according to a third arrangement order which is the same as the second arrangement order; and
the step of converting the first information table into the fourth information table comprises the substeps of: according to the adjustment table, the first information table and the control signal, the inverse permutation adjustment operation is executed to generate the fourth information table.
15. The method of claim 13, wherein:
the second authentication information further comprises the cash card balance contained in the application coding information;
the specific application function is the cash consuming function and is performed by using the cash card balance;
the step of creating the project information table in the creation phase comprises the substeps of: setting the first short message receiving number by receiving the input of the first user; and
the method further comprises the following steps:
presetting the first short message receiving number by using a default number before the establishing stage;
updating the cash card balance by executing the specific application function to form a cash card balance update;
generating the transaction message according to the balance update of the cash card so as to transmit the transaction message to the specific external device; and
after the electronic tag is authenticated as genuine, the first received short message number is replaced with a second received short message number intended by the user by receiving a second user input from the user at a time intended by the user.
16. The method of claim 13, wherein:
the electronic tag is a wireless radio frequency identification tag;
the starting control table comprises a plurality of bits and is contained in the application coding information, and the bits respectively correspond to a plurality of starting signals;
the specific application function is the entrance guard control function and is executed by using the starting control table to control the electric equipment of a specific restricted entrance forbidden zone, wherein the specific restricted entrance forbidden zone is used for controlling one of the user and the application device with the electronic tag;
the plurality of bits include a specific bit used to control a specific enable signal among the plurality of enable signals, wherein the specific enable signal controls the electrical appliance to determine whether the one of the user and the application device is allowed to enter the specific restricted zone;
the specific bit represents one of an authorized state and an unauthorized state; and
the method further comprises the following steps:
when the specific bit represents the authorized state, the user and the application device are allowed to enter the specific restricted access zone by executing the specific application function;
when the specific bit represents the unauthorized state, the user and the application device are prohibited from entering the specific restricted access zone by executing the specific application function;
generating the transaction message according to the specific bit to transmit the transaction message to the specific external device;
the step of creating the project information table comprises the substeps of: setting the item code according to a predetermined radio frequency identification function combined with the electronic tag, wherein:
the predetermined RFID function includes at least one of the financial function, the credit card function, the temporary counter service function, the cash consumption function, the short message transmission function, the cash balance selection function, the entrance guard control function, the project tracking function, the specific UHF access distance application function, the specific HF access distance application function, and the combination thereof,
the specific UHF access distance application function is a passive UHF long access distance application function, a passive UHF short access distance application function with a relatively high memory capacity, a high frequency short access distance application function, a semi-passive UHF long access distance application function for positioning when the electronic tag is moving, one of a semi-passive uhf long access distance application function with a relatively high memory capacity, a passive uhf long access distance application function for positioning, a passive uhf long access distance application function with a relatively high memory capacity, a passive uhf near access distance application function, and a passive uhf near access distance application function with a relatively high memory capacity, and a combination thereof.
The specific high frequency access distance application function is one of a high frequency short access distance application function, a high frequency short access distance application function with a relatively high memory capacity, a passive high frequency short access distance application function for access control and positioning, and a passive high frequency short access distance application function with a relatively high memory capacity; and
the step of creating the project information table further comprises the substeps of: setting the encryption key by using a specific operation according to the sub-information and at least one of the tag serial number and the user number, wherein:
the specific operation is one of a first operation, a second operation, a third operation, and a fourth operation,
the first operation sets the encryption key equal to a first sum of the tag number, the user number and the sub-information,
the second operation sets the encryption key equal to a second sum of the tag number and the sub-information,
the third operation sets the encryption key equal to a result obtained from an arithmetic operation applied to the sub information and at least one of the tag number and the user number, and
the fourth operation extracts a particular number of bits from a selected one of the first sum, the second sum, and the result to generate a binary value, and sets the encryption key equal to the binary value.
17. The method of claim 13, wherein
The tag memory further stores measurable parameter information contained in the application code information, wherein the measurable parameter information includes at least one of a usage time, a distance, a weight, a flow rate, a cash card balance, a bus station number of mass transit, and a landing place number of a flight route;
the specific application function is the traffic charging function and is performed by using the measurable parameter information;
the method further comprises the following steps:
converting the measurable parameter information into a charge amount for a transaction by executing the specific application function;
generating the transaction message according to the transaction to transmit the transaction message to the specific external device; and
providing a system message, wherein the transaction message is further generated in accordance with the system message; and
the step of creating the project information table comprises the substeps of: setting the item destruction password and the item access password according to the label serial number, the second password mask and the hash table, wherein:
the tag sequence number has a binary value with M bits, where M > 1;
the substep of setting the item destruction password and the item access password is performed in one of a first state and a second state, wherein:
when the sub-step of setting the item destruction password and the item access password is performed in the first state, the sub-step of setting the item destruction password and the item access password comprises the sub-steps of:
selecting a particular bit from the binary value to produce a first value based on the second cryptographic mask;
encoding the first value to generate a first control signal;
when the first control signal represents an odd number, executing a first encryption operation according to the hash table and the odd number to generate a first destruction password value and a first access password value, and setting the item destruction password and the item access password to be respectively equal to the first destruction password value and the first access password value; and
when the first control signal represents an even number, executing a second encryption operation according to the hash table and the even number to generate a second destroy password value and a second access password value, and setting the item destroy password and the item access password to be respectively equal to the second destroy password value and the second access password value; and
when the sub-step of setting the item destruction password and the item access password is performed in the second state, the sub-step of setting the item destruction password and the item access password comprises the sub-steps of:
selecting N bits from the M bits to generate a second value based on the second cryptographic mask, wherein N > 1;
encoding the second value to generate a second control signal;
executing a third encryption operation according to the hash table and the second control signal to generate a third destroy password value and a third access password value; and
the item destruction password and the item access password are set equal to the third destruction password value and the third access password value, respectively.
CN201710437312.2A 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag Active CN107133664B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
TW102105419 2013-02-08
TW102105419A TWI502525B (en) 2012-04-17 2013-02-08 Electronic tag and authentication system and method for securing electronic tag
CN201310728850.9A CN103984976B (en) 2013-02-08 2013-12-26 Method, device and system for using electronic tag

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201310728850.9A Division CN103984976B (en) 2013-02-08 2013-12-26 Method, device and system for using electronic tag

Publications (2)

Publication Number Publication Date
CN107133664A CN107133664A (en) 2017-09-05
CN107133664B true CN107133664B (en) 2020-06-05

Family

ID=51293374

Family Applications (5)

Application Number Title Priority Date Filing Date
CN201710444961.5A Active CN107273775B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag
CN201310728850.9A Active CN103984976B (en) 2013-02-08 2013-12-26 Method, device and system for using electronic tag
CN201710437735.4A Active CN107273774B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag
CN201710437311.8A Active CN107256355B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag
CN201710437312.2A Active CN107133664B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag

Family Applications Before (4)

Application Number Title Priority Date Filing Date
CN201710444961.5A Active CN107273775B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag
CN201310728850.9A Active CN103984976B (en) 2013-02-08 2013-12-26 Method, device and system for using electronic tag
CN201710437735.4A Active CN107273774B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag
CN201710437311.8A Active CN107256355B (en) 2013-02-08 2013-12-26 Electronic tag and processing system and method for ensuring electronic tag

Country Status (1)

Country Link
CN (5) CN107273775B (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9721237B2 (en) * 2011-06-24 2017-08-01 Paypal, Inc. Animated two-dimensional barcode checks
CA3176770A1 (en) * 2014-12-24 2016-06-30 10353744 Canada Ltd. Settlement system and settlement method
CN104463286A (en) * 2014-12-30 2015-03-25 吴军明 Novel radio frequency identification tag manufacturing method
CN105354519B (en) * 2015-10-23 2019-03-15 福建优安米信息科技有限公司 A kind of processing data information system and its processing method
JP6629339B2 (en) * 2015-10-30 2020-01-15 株式会社東芝 Battery control device and battery system
CN106874987B (en) * 2017-03-22 2019-06-14 成都芯昊芯科技有限公司 A kind of passive tag chip operating mode configuration method
CN107749085A (en) * 2017-10-25 2018-03-02 北京匡恩网络科技有限责任公司 Ticket card, method and machinable medium using ticket card
CN108053154A (en) * 2017-11-30 2018-05-18 云南九方联达供应链管理科技有限公司 Supply-chain management system based on cloud platform
CN108269353B (en) * 2018-01-17 2021-04-30 北京网信云服信息科技有限公司 Self-service money exchange machine and self-service money exchange system
CN109399104A (en) * 2018-11-19 2019-03-01 吴建国 Housing system and its application method with wisdom interface
CN109766733B (en) * 2019-01-07 2021-05-18 武汉大学 Radio frequency tag monitoring method based on unique collision set
DE102019202247A1 (en) * 2019-02-19 2020-08-20 Siemens Aktiengesellschaft Procedure and arrangement for protecting a charging station from improper use
CN110381511B (en) * 2019-07-24 2020-11-20 深圳大学 Non-orthogonal multiple access authentication system based on shared physical layer authentication label
CN111737344B (en) * 2020-05-20 2023-08-25 时时同云科技(成都)有限责任公司 Data synchronization method and device for tag type weighing equipment
CN112345531B (en) * 2020-10-19 2024-04-09 国网安徽省电力有限公司电力科学研究院 Transformer fault detection method based on bionic robot fish
TWI786487B (en) * 2020-12-11 2022-12-11 振曜科技股份有限公司 Intelligent logistics labeling system and method for applying same
CN113343735B (en) * 2021-08-05 2021-11-05 深圳市成为信息技术有限公司 Tag processing method of reader-writer, reader-writer and storage medium
CN113705258B (en) * 2021-08-24 2023-05-16 电子科技大学 Method for exchanging data between reader and RFID tag
CN113657131B (en) * 2021-10-20 2022-02-11 深圳市成为信息技术有限公司 Label checking method of UHF handheld terminal and UHF handheld terminal
CN113722720B (en) * 2021-10-29 2022-02-18 苏州浪潮智能科技有限公司 System starting method and related device
CN114399862B (en) * 2021-12-16 2023-01-13 国家核安保技术中心 Gate passing control method and system based on temperature detection and gate inhibition authorization
CN114095911B (en) * 2022-01-20 2022-05-03 深圳维特智能科技有限公司 NFC (near field communication) bandwidth adjusting method and device based on wireless network router
CN115186854B (en) * 2022-09-07 2022-12-16 艾斯特国际安全技术(深圳)有限公司 Certificate acquisition control method, device and system and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1655161A (en) * 2005-03-07 2005-08-17 福建榕基软件开发有限公司 Business delivery certification system
CN101226600A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 Interactive electronic label, system method employed based on radio frequency recognition technique
CN101980273A (en) * 2010-11-04 2011-02-23 银川市高新电子应用技术研究所 Radio frequency identification technology-based commodity sales management system and method
CN102289768A (en) * 2011-08-24 2011-12-21 悦捷科技股份有限公司 Electronic transaction system
CN102855509A (en) * 2012-08-28 2013-01-02 湖南爱瑞杰科技发展股份有限公司 Novel motor vehicle driving license and management system thereof
CN102867344A (en) * 2012-09-07 2013-01-09 湖南爱瑞杰科技发展股份有限公司 Internet of Things entrance guard checking-in system and device
CN102916956A (en) * 2012-10-15 2013-02-06 北京理工大学 Hash function based RFID (Radio Frequency IDentification) mutual authentication method

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3335987B2 (en) * 1998-07-22 2002-10-21 日本電信電話株式会社 Non-contact IC card reader
AUPQ777200A0 (en) * 2000-05-26 2000-06-22 Embridge Lake Pty Ltd Control system
JP2004200829A (en) * 2002-12-17 2004-07-15 Furukawa Electric Co Ltd:The Rf id tag
CN1696986A (en) * 2004-05-11 2005-11-16 张金生 Anti-theft device of using wireless networked early warming
US20080129037A1 (en) * 2006-12-01 2008-06-05 Prime Technology Llc Tagging items with a security feature
US20080244714A1 (en) * 2007-03-27 2008-10-02 Michael Kulakowski Secure RFID authentication system using non-trusted communications agents
CN101440675A (en) * 2007-11-20 2009-05-27 长盛科技股份有限公司 Gate inhibition control method and system thereof
US10579995B2 (en) * 2010-03-30 2020-03-03 Visa International Service Association Event access with data field encryption for validation and access control
CN101908176A (en) * 2010-08-02 2010-12-08 国电南瑞科技股份有限公司 Method for modeling on basis of power information data and applying metadata management
TW201227556A (en) * 2010-12-24 2012-07-01 Chunghwa Telecom Co Ltd Electronic transaction system and payment method using telecommunication phone number as account number
CN102176718A (en) * 2010-12-28 2011-09-07 山东大学 Campus card based electrical and electronic experimental center comprehensive management system
CN102750558A (en) * 2011-04-20 2012-10-24 张默 Implementation method of multifunctional intelligent electronic label management system based on cloud computation
CN102298753A (en) * 2011-08-02 2011-12-28 悦捷科技股份有限公司 Anti-counterfeiting system for product
CN102509238A (en) * 2011-11-29 2012-06-20 成都安朗电气自控设备有限公司 Bank non-cash business processing method, apparatus and system
CN102880887B (en) * 2012-08-07 2015-12-16 深圳市金之彩文化创意有限公司 There is product information read method and the system of the alcohol product of metal external packing box

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1655161A (en) * 2005-03-07 2005-08-17 福建榕基软件开发有限公司 Business delivery certification system
CN101226600A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 Interactive electronic label, system method employed based on radio frequency recognition technique
CN101980273A (en) * 2010-11-04 2011-02-23 银川市高新电子应用技术研究所 Radio frequency identification technology-based commodity sales management system and method
CN102289768A (en) * 2011-08-24 2011-12-21 悦捷科技股份有限公司 Electronic transaction system
CN102855509A (en) * 2012-08-28 2013-01-02 湖南爱瑞杰科技发展股份有限公司 Novel motor vehicle driving license and management system thereof
CN102867344A (en) * 2012-09-07 2013-01-09 湖南爱瑞杰科技发展股份有限公司 Internet of Things entrance guard checking-in system and device
CN102916956A (en) * 2012-10-15 2013-02-06 北京理工大学 Hash function based RFID (Radio Frequency IDentification) mutual authentication method

Also Published As

Publication number Publication date
CN107273775B (en) 2020-06-05
CN107256355B (en) 2020-10-16
CN103984976A (en) 2014-08-13
CN103984976B (en) 2017-06-30
CN107256355A (en) 2017-10-17
CN107273774A (en) 2017-10-20
CN107133664A (en) 2017-09-05
CN107273775A (en) 2017-10-20
CN107273774B (en) 2020-12-01

Similar Documents

Publication Publication Date Title
CN107133664B (en) Electronic tag and processing system and method for ensuring electronic tag
TWI587226B (en) Electronic tag and processing system and method for securing electronic tag
US20200082396A1 (en) Electronic tag and system and method for securing electronic tag
US10977646B2 (en) System and method for authentication using payment protocol
RU2427915C2 (en) Equipment and method of payment making integrated with electronic goods delivery
US8386349B2 (en) Verification of a portable consumer device in an offline environment
US20210350197A1 (en) Electronic tag and system and method for securing electronic tag
US8025223B2 (en) System and method for mass transit merchant payment
US20040206814A1 (en) Electronic money system and transaction method using the same
JP2002512711A (en) Transaction method with portable identification element
CN101373547A (en) Electronic wallet device and method of using electronic value
CN105354518B (en) Virtual chip card system based on mobile intelligent terminal soft excitation electromagnetic near field mutual inductance
CN101351809A (en) System and method for secured account numbers in proximity devices
JP2020515994A (en) Electronic payment device
US20170132692A1 (en) Simplified delivery of shipments with goods not yet paid for
KR20070052026A (en) Smart card charger and dispensor
WO2004075081A1 (en) Mobile net commerce settlement system
Katpatal et al. A Smart Public Ration Distribution System
Kent SMART CARDS AS AN ELECTRONIC MEDIUM OF PAYMENT FOR BANKING SYSTEMS

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1243806

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant