CN1858771A - Radio frequency identifying secrete system and method - Google Patents
Radio frequency identifying secrete system and method Download PDFInfo
- Publication number
- CN1858771A CN1858771A CN 200510068728 CN200510068728A CN1858771A CN 1858771 A CN1858771 A CN 1858771A CN 200510068728 CN200510068728 CN 200510068728 CN 200510068728 A CN200510068728 A CN 200510068728A CN 1858771 A CN1858771 A CN 1858771A
- Authority
- CN
- China
- Prior art keywords
- user
- identification
- reader
- password
- electron device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
This invention provides a RF identifying and security system and a method, in which, said system includes a RF identifying label and a portable electronic device, said label includes a user identification code, said portable electronic device includes a reader, an identification storage unit and an identification controller, the reader is used in setting up communication with the RF identification label and receives the identification code of the user, the identifying and storing unit is used in storing code of the the user, the identification controller is connected with the reader and the idenfication unit electrically and compares the identification code and the code of the user.
Description
Technical field
The present invention relates to a kind of radio frequency identification system, and particularly relates to a kind of device and method of controlling the rights of using of portable electron device by RFID tag.
Background technology
Along with the progress of science and technology, portable electron device miscellaneous makes rapid progress, and develops towards light, thin, short, little direction, even possesses the function of communication or connected network, as mobile computer, PDA(Personal Digital Assistant) and mobile phone etc.And portable electron device develops towards directions such as multi-functional compound and personal information management one after another, so the confidentiality of its information is quite important.
The secrecy system that generally is used for portable electron device is normally controlled user's rights of using by the mode (for example startup password or user's password) of input password, invades improperly and destroys to prevent the external world.But this password may be cracked, and the secret mode of this kind must manually input password often, for user's very trouble that seems in operation.Another kind of new secrecy system is the rights of using that the mode of employing fingerprint recognition is controlled the user.Yet the identification plate that the secret mode of this fingerprint is used may influence its discrimination because of the dirty or long-term wearing and tearing of using the back to be produced.Generally speaking, its fingerprint recognition poor effect therefore neither a kind of desirable secret mode.
Summary of the invention
The purpose of this invention is to provide a kind of radio frequency identifying secrete system, use contactless radio frequency identification mode (Radio Frequency Identification; RFID) control the rights of using of portable electron device, to improve known contact recognition method easy crack, manually to import problem loaded down with trivial details and that discrimination is not good.
The object of the invention to solve the technical problems realizes by the following technical solutions.In order to reach the foregoing invention purpose, according to a preferred embodiment of the present invention, this radio frequency identifying secrete system comprises a RFID tag and a portable electron device.This RFID tag comprises a label antenna, a tag memory cell and a label controller.Label antenna is in order to reception reader identification sign indicating number, and tag memory cell is then in order to store the reader password.Label controller electrically connects label antenna and tag memory cell, and relatively whether reader identification sign indicating number and reader password be identical.When the reader identification sign indicating number was identical with the reader password, label controller sent user's identification code by label antenna.
As a kind of improvement of the present invention, this portable electron device comprises a reader, a recognition memory cell and an identification controller.Reader receives user's identification code and sends the reader identification sign indicating number in order to set up communication with RFID tag.Recognition memory cell is in order to store user's password.Identification controller then electrically connects reader and recognition memory cell, and compares user's identification code and user's password.When user's identification code was identical with user's password, identification controller sent start signal to open the rights of using of portable electron device.
Above-mentioned radio frequency identifying secrete system also comprises a server, in order to provide this user's password to be stored in this recognition memory cell.
In the above-mentioned radio frequency identifying secrete system, this identification controller is an embedded controller or is a South Bridge chip.
In the above-mentioned radio frequency identifying secrete system, this start signal is a startup password, in order to open the rights of using of this portable electron device.
As another kind of improvement the of the present invention, in the above-mentioned radio frequency identifying secrete system, this reader is in order to receive this user's identification code, and when this reader does not receive this user's identification code or this user's identification code and this user's password and when inequality, this identification controller can send a shutdown signal to close the rights of using of this portable electron device.
Another technical matters to be solved by this invention provides a kind of radio-frequency (RF) identification time slot scrambling, but a plurality of different users of keyholed back plate and can avoid user's identification code to be read arbitrarily or duplicate to the rights of using of same portable electron device.
The object of the invention to solve the technical problems also adopts following technical scheme to realize.Again, in order to reach the foregoing invention purpose, according to another preferred embodiment of the present invention, this radio-frequency (RF) identification time slot scrambling is to receive the reader identification sign indicating number that reader sent by RFID tag, and whether compare reader password stored in reader identification sign indicating number and the RFID tag identical.When the reader identification sign indicating number is identical with the reader password, send user's identification code.Then, again by the user's identification code that is disposed at the reader received RF identification label in the portable electron device, and relatively whether user's identification code is identical with user's password.When user's identification code is identical with user's password, check that by this identification controller whether this portable electron device exists a start mark, when this start mark does not exist, opens this portable electron device by this identification controller; When user's identification code and user's password and when inequality, check that by this identification controller whether this portable electron device exists a start mark, when this start mark exists, closes this portable electron device by this identification controller.
In the above-mentioned radio-frequency (RF) identification time slot scrambling, when this user's identification code and this user's password and when inequality, this radio-frequency (RF) identification time slot scrambling also comprises the following step: by the reception number of times of this identification controller record this user's identification code inequality; And when receiving number of times, transmit warning message to a server by this identification controller above a predetermined value.
In the above-mentioned radio-frequency (RF) identification time slot scrambling, when this reader does not receive this user's identification code, close the rights of using of this portable electron device by this identification controller.
Above-mentioned radio-frequency (RF) identification time slot scrambling also comprises following steps: set this user's password, and this user's password is stored in the recognition memory cell of this portable electron device.
Above-mentioned radio-frequency (RF) identification time slot scrambling also comprises following steps: this portable electron device reads this user's password from a server, for comparing with this user's identification code.
The present invention compared with prior art has tangible advantage and beneficial effect.Via as can be known above-mentioned, the invention relates to a kind of radio frequency identifying secrete system, use contactless radio frequency identification mode to control the rights of using of portable electron device, to improve known contact recognition method easy crack, manually to import problem loaded down with trivial details and that discrimination is not good, and but a plurality of different users of keyholed back plate are read arbitrarily or are duplicated to avoid user's identification code the rights of using of same portable electron device.
Description of drawings
For above and other objects of the present invention, feature, advantage and embodiment can be become apparent, accompanying drawing is described in detail as follows:
Fig. 1 is the synoptic diagram that illustrates the present invention's first preferred embodiment;
Fig. 2 is the method flow diagram that illustrates the present invention's first preferred embodiment;
Fig. 3 A is the synoptic diagram that illustrates the RFID tag in the present invention's first preferred embodiment;
Fig. 3 B is the method flow diagram that illustrates the RFID tag in the present invention's first preferred embodiment;
Fig. 4 is the method flow diagram that illustrates the present invention's second preferred embodiment;
Fig. 5 is the synoptic diagram that illustrates the present invention's second preferred embodiment; And
Fig. 6 then is the method flow diagram that illustrates the present invention's second preferred embodiment.
The number in the figure explanation:
100: radio frequency identifying secrete system
110: portable electron device
112: reader
114: identification controller
116: recognition memory cell
120: RFID tag
312: reader
320: RFID tag
322: label antenna
324: label controller
326: tag memory cell
500: radio frequency identifying secrete system
Embodiment
Radio frequency identification (Radio Frequency Identification; RFID), be a kind of contactless automatic identification technology, it is to utilize the automatic recognition objective thing of radiofrequency signal and obtain relevant information, operates quick and conveniently, identification maneuver need not manually get involved, and can discern dynamic object and can discern a plurality of labels simultaneously.Radio frequency identification be one handy, simple and practical and be particularly suitable for the technology of robotization control, it both can be used for the pattern that only reads, also can be used for read-write mode.
The complete radio frequency identification system of one cover is made up of reader (Reader) and identification controller (Transponder) two parts, and wherein identification controller is also referred to as RFID tag (RFIDTag) usually.The operating principle of radio frequency identification system is to launch the radio wave energy of a characteristic frequency to RFID tag by reader earlier, send inner identification code (IDCode) in order to drive RFID tag, or also can initiatively send this identification code by RFID tag.Reader then receives this identification code, delivers to central processing system again and carries out relevant data processing.
The present invention be with reader configuration in portable electron device, control the rights of using of portable electron device by user's identification code of received RF identification label representative, so improve known contact recognition method easy crack, manually import problem loaded down with trivial details and that discrimination is not good.
Fig. 1 is the synoptic diagram that illustrates the present invention's first preferred embodiment.As shown in Figure 1, this radio frequency identifying secrete system 100 comprises a RFID tag 120 and a portable electron device 110.This RFID tag 120 has user's identification code.This portable electron device comprises a reader 112, an identification controller 114 and a recognition memory cell 116.Reader 112 is in order to setting up communication with RFID tag 120, and receives its user's identification code.Recognition memory cell 116 is in order to store user's password.114 of identification controllers electrically connect reader 112 and recognition memory cell 116, and in order to relatively whether user's identification code and user's password identical.When user's identification code was identical with user's password, identification controller 114 sent start signal to open the rights of using of portable electron device 110.
And this embedded controller or South Bridge chip usually can be in order to the switching on and shutting down program and the defaults of control portable electron device 110, for example battery settings, setting backlight, power saving setting or play-over etc.Therefore, when portable electron device 110 was in off-mode, above-mentioned start signal can be a startup password at this moment, to open portable electron device 110.Similarly, when portable electron device 110 was in park mode, above-mentioned start signal can be a dormancy return signal or a password at this moment, made portable electron device 110 return back to normal mode of operation from park mode.
In addition, this recognition memory cell 116 for example is erasable EEPROM or other memory subassembly that is suitable for.As a rule, the memory capacity of this recognition memory cell 116 enough stores a plurality of different user's passwords that belong to the different users.Therefore, radio frequency identifying secrete system 100 thus a plurality of different users of keyholed back plate to the rights of using of same portable electron device.Even, after in conjunction with above-mentioned embedded controller or South Bridge chip, those of ordinary skill is to be understood that, start signal in the present invention's first preferred embodiment also can comprise the default instruction, in the rights of using of opening 110 couples of a certain users of this portable electron device, can reset the default of this portable electron device 110 in passing, this portable electron device 110 is adjusted to the state that user at that time is accustomed to most.
Fig. 2 is the method flow diagram that illustrates the present invention's first preferred embodiment, so that radio-frequency (RF) identification time slot scrambling of the present invention to be described.In order more to clearly demonstrate first preferred embodiment, below explanation please refer to Fig. 1 and Fig. 2.Whether this radio-frequency (RF) identification time slot scrambling is by the user's identification code (step 202) that is disposed at the reader 112 received RF identification labels 120 on the portable electron device 110, and relatively user's identification code and user's password identical (step 204).When user's identification code is identical with user's password, open the rights of using (step 206) of portable electron device 110; When user's identification code and user's password and when inequality, close the rights of using (step 208) of portable electron device 110.
In addition, according to first preferred embodiment of the present invention, above-mentioned reader 112 also can be periodically or is received user's identification code randomly.For instance, reader 112 can be periodically or is sent induced signal randomly, makes that all RFID tag 120 in its working range are responded its corresponding user's identification code.Perhaps, if RFID tag 120 is active, then reader 112 can be periodically or is received user's identification code that active radio frequency identification label 120 is sent randomly.When reader 112 does not receive user's identification code (user who for example has RFID tag 120 leaves this portable electron device 110), or user's identification code and user's password and when inequality, identification controller 114 can send a shutdown signal to close the rights of using of portable electron device 110.
Read arbitrarily or duplicate for fear of user's identification code, the present invention also adds a kind of affirmation mechanism in RFID tag, checks earlier whether reader is allowed to receive its user's identification code, to improve the secret ability of radio frequency identifying secrete system of the present invention.
Fig. 3 A is the synoptic diagram that illustrates the RFID tag in the present invention's first preferred embodiment, and Fig. 3 B then is the method flow diagram that illustrates first preferred embodiment, and below explanation please refer to Fig. 3 A and Fig. 3 B.In this preferred embodiment, reader 312 can send a reader identification sign indicating number.RFID tag 320 comprises a label antenna 322, a label controller 324 and a tag memory cell 326.Label antenna 322 is in order to receive reader identification sign indicating number and emission user identification code.326 of tag memory cells can store a reader password and user's identification code.Label controller 324 electrically connects label antenna 322 and tag memory cells 326, and be responsible for relatively the reader identification sign indicating number and the reader password whether identical.
Shown in Fig. 3 B, RFID tag 320 at first receives the reader identification sign indicating number (step 332) that reader 312 is sent by label antenna 322.Whether then, label controller 324 can read the reader password (step 333) that is stored in the tag memory cell 326, more relatively reader identification sign indicating number and reader password identical (step 334).When the reader identification sign indicating number was identical with the reader password, label controller 324 sent user's identification code (step 336) by label antenna 322; When reader identification sign indicating number and reader password and when inequality, do not send user's identification code (step 338).That is to say that RFID tag 320 so can improve the secret ability of radio frequency identifying secrete system of the present invention confirming that reader 312 for after allowing to receive the reader of user's identification code, just can send user's identification code.
Fig. 4 is the method flow diagram that illustrates the present invention's second preferred embodiment.Compare with preferred embodiment shown in Figure 2, this preferred embodiment increases the setting step of user's password and the checking mechanism of start mark.The user sets and stores user's password thus, and can further provide the corresponding action of maintaining secrecy at residing at that time start of portable electron device 110 or off-mode.
In order to clearly demonstrate this preferred embodiment, below explanation please refer to Fig. 1 and Fig. 4.This radio-frequency (RF) identification time slot scrambling is to set user's password earlier, user's identification code of for example specifying a certain RFID tag 120 representatives is as this user's password, and by identification controller 114 with this user's password storage in recognition memory cell 116 (step 401).Afterwards, when this RFID tag 120 during near the portable electron device 110 of configured readers 112, user's identification code (step 402) that this reader 112 can received RF identification labels 120 be sent, and relatively user's identification code and user's password whether identical (step 404).
Then, no matter whether user's identification code is identical with user's password, this preferred embodiment all can be carried out the inspection step of a start mark (flag), to confirm whether portable electron device 110 is in open state (step 406 and 408) at this moment.If the start mark exists, represent that then this portable electron device 110 is in open state; Otherwise,, represent that then this portable electron device 110 is in off-mode if the start mark does not exist.
When user's identification code is identical with user's password, and the start mark then continues to maintain open state (step 416) with this portable electron device 110 when existing.When user's identification code is identical with user's password, and the start mark is then opened this portable electron device 110 (step 426) when not existing.And as mentioned above, this start signal selectively comprises startup password or default instruction, to make things convenient for manipulating of user.
On the other hand, when user's identification code and user's password and inequality, and the start mark is then closed this portable electron device 110 (step 418) when existing.When user's identification code and user's password and inequality, and the start mark then maintains off-mode (step 428) with this portable electron device 110 when not existing.So not only can improve the function of keeping secret of portable electron device 110, and can reach the function of power saving.
Fig. 5 is the synoptic diagram that illustrates the present invention's second preferred embodiment, and Fig. 6 then is the method flow diagram that illustrates second preferred embodiment.Compare with first preferred embodiment shown in Figure 1, this second preferred embodiment is to provide the user password by server.That is to say this second preferred embodiment uses server to come which user of control to have the rights of using of this portable electron device, therefore be specially adapted to the management of portable electron device in the high security zone, for example the control zone of research and development department etc.
As shown in Figure 5, this radio frequency identifying secrete system 500 except with RFID tag 120 and portable electron device 110 identical shown in first preferred embodiment of Fig. 1, also comprise a server 530.This server 530 is in order to provide the user password, for storing or being temporary in the recognition memory cell 116.Because the user's password in this preferred embodiment is provided by server 530, so system operator of this radio frequency identifying secrete system 500, for example the security information departmental staff of company can or change the rights of using of different users for each portable electron device 110 by server 530 real-time keyholed back plates.
More specifically, this radio-frequency (RF) identification time slot scrambling is to read user's password by server earlier, user's identification code of for example a certain RFID tag 120 representatives, and by identification controller 114 this user's password is stored or is temporarily stored in the recognition memory cell 116 (step 601).Afterwards, when this RFID tag 120 during near the portable electron device 110 of configured readers 112, user's identification code (step 602) that this reader 112 can received RF identification labels 120 be sent, and relatively user's identification code and user's password whether identical (step 604).
Then, no matter whether user's identification code is identical with user's password, this second preferred embodiment all can be carried out the inspection step of a start mark (flag), to confirm whether portable electron device 110 is in open state (step 606 and 608) at this moment.If the start mark exists, represent that then this portable electron device 110 is in open state; Otherwise,, represent that then this portable electron device 110 is in off-mode if the start mark does not exist.
When user's identification code is identical with user's password, and the start mark then continues to maintain open state (step 616) with this portable electron device 110 when existing.When user's identification code is identical with user's password, and the start mark is then opened this portable electron device 110 (step 626) when not existing.And as mentioned above, this start signal selectively comprises startup password or default instruction, to make things convenient for manipulating of user.
On the other hand, when user's identification code and user's password and inequality, and the start mark is then closed this portable electron device 110 (step 618) when existing.When user's identification code and usefulness person password and inequality, and the mark of starting shooting then maintains off-mode (step 628) with this portable electron device 110 when not existing.So not only can improve the function of keeping secret of portable electron device 110, and can reach the function of power saving.
And, if reader 112 receives wrong user's identification code, for example different with user's password user's identification codes then writes down the reception number of times (step 638) of user's identification code inequality, and judges that this receives number of times and whether surpasses a default value (step 648).When receiving number of times above default value, transmit a warning message to server, have the stranger near this portable electron device 110 (step 658) with the system operator of reminding radio frequency identifying secrete system 500, for example other people enter in the control zone of research and development department without approval.The action of this record can promote the secret ability of radio frequency identifying secrete system of the present invention significantly, and the strengthening system supvr is for the control of control zone.
Though the present invention with preferred embodiment openly as above; yet it is not in order to limit the present invention; any those of ordinary skill of haveing the knack of this technology; without departing from the spirit and scope of the present invention; various changes and the retouching done; all should belong within the patent claim of the present invention, so protection scope of the present invention should be looked the scope that claim defines and is as the criterion.
Claims (10)
1. radio frequency identifying secrete system is characterized in that this system comprises:
One RFID tag have user's identification code, and this RFID tag comprises:
One label antenna is in order to receive a reader identification sign indicating number;
One tag memory cell is in order to store a reader password; And
One label controller, electrically connect this label antenna and this tag memory cell, and relatively this reader identification sign indicating number and this reader password, when this reader identification sign indicating number was identical with this reader password, this label controller sent this user's identification code by this label antenna; And
One portable electron device, this portable electron device comprises:
One reader in order to set up communication with this RFID tag, receives this user's identification code and sends this reader identification sign indicating number;
One recognition memory cell is in order to store user's password; And
One identification controller, electrically connect this reader and this recognition memory cell, and relatively this user's identification code and this user's password, when this user's identification code was identical with this user's password, this identification controller sent a start signal to open the rights of using of this portable electron device.
2. radio frequency identifying secrete system as claimed in claim 1 is characterized in that described radio frequency identifying secrete system also comprises a server, in order to provide this user's password to be stored in this recognition memory cell.
3. radio frequency identifying secrete system as claimed in claim 1 is characterized in that described identification controller is an embedded controller or is a South Bridge chip.
4. radio frequency identifying secrete system as claimed in claim 1 is characterized in that described start signal is a startup password, in order to open the rights of using of this portable electron device.
5. radio frequency identifying secrete system as claimed in claim 1, it is characterized in that described reader is in order to receive this user's identification code, and when this reader does not receive this user's identification code or this user's identification code and this user's password and when inequality, this identification controller can send a shutdown signal to close the rights of using of this portable electron device.
6. radio-frequency (RF) identification time slot scrambling to control the rights of using of a portable electron device, is characterized in that this radio-frequency (RF) identification time slot scrambling comprises the following step by a RFID tag:
A. this RFID tag receives the reader identification sign indicating number that this reader sends, and relatively whether this reader identification sign indicating number is identical with a reader password;
B. when this reader identification sign indicating number is identical with this reader password, send user's identification code;
C. receive this user's identification code by a reader that is disposed on this portable electron device, and relatively whether this user's identification code is identical with user's password;
C1. when this user's identification code is identical with this user's password, check by this identification controller whether this portable electron device exists a start mark;
C11. when this start mark does not exist, open this portable electron device by this identification controller;
C2. when this user's identification code and this user's password and when inequality, check by this identification controller whether this portable electron device exists a start mark; And
C21. when this start mark exists, close this portable electron device by this identification controller.
7. radio-frequency (RF) identification time slot scrambling as claimed in claim 6 is characterized in that among the described step c2, and when this user's identification code and this user's password and when inequality, this radio-frequency (RF) identification time slot scrambling also comprises the following step:
C22. write down the reception number of times of this user's identification code inequality by this identification controller; And
C23. when receiving number of times, transmit warning message to a server by this identification controller above a predetermined value.
8. radio-frequency (RF) identification time slot scrambling as claimed in claim 6 is characterized in that being closed the rights of using of this portable electron device by this identification controller when this reader does not receive this user's identification code.
9. radio-frequency (RF) identification time slot scrambling as claimed in claim 6 is characterized in that before the described step a, and this radio-frequency (RF) identification time slot scrambling also comprises following steps:
A1. set this user's password, and this user's password is stored in the recognition memory cell of this portable electron device.
10. radio-frequency (RF) identification time slot scrambling as claimed in claim 6 is characterized in that before the described step a, and this radio-frequency (RF) identification time slot scrambling also comprises following steps:
A2. this portable electron device reads this user's password from a server, for comparing with this user's identification code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100687289A CN100412880C (en) | 2005-04-30 | 2005-04-30 | Radio frequency identifying secrete system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100687289A CN100412880C (en) | 2005-04-30 | 2005-04-30 | Radio frequency identifying secrete system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1858771A true CN1858771A (en) | 2006-11-08 |
CN100412880C CN100412880C (en) | 2008-08-20 |
Family
ID=37297679
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005100687289A Expired - Fee Related CN100412880C (en) | 2005-04-30 | 2005-04-30 | Radio frequency identifying secrete system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100412880C (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101551847B (en) * | 2009-04-30 | 2011-09-28 | 张利峰 | Radio-frequency wireless input method |
CN102202294A (en) * | 2010-03-23 | 2011-09-28 | 纬创资通股份有限公司 | Data encryption method and wireless communication system |
WO2011143805A1 (en) * | 2010-05-17 | 2011-11-24 | 云文平 | Device connecting portable storage media for non-built-in data security |
CN103295039A (en) * | 2013-06-17 | 2013-09-11 | 上海众人网络安全技术有限公司 | Radio frequency card read-write operation method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4304035B2 (en) * | 2003-09-29 | 2009-07-29 | 株式会社ジクシス | Counterfeit product prevention system |
-
2005
- 2005-04-30 CN CNB2005100687289A patent/CN100412880C/en not_active Expired - Fee Related
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101551847B (en) * | 2009-04-30 | 2011-09-28 | 张利峰 | Radio-frequency wireless input method |
CN102202294A (en) * | 2010-03-23 | 2011-09-28 | 纬创资通股份有限公司 | Data encryption method and wireless communication system |
WO2011143805A1 (en) * | 2010-05-17 | 2011-11-24 | 云文平 | Device connecting portable storage media for non-built-in data security |
CN103295039A (en) * | 2013-06-17 | 2013-09-11 | 上海众人网络安全技术有限公司 | Radio frequency card read-write operation method |
CN103295039B (en) * | 2013-06-17 | 2015-10-28 | 上海众人网络安全技术有限公司 | Radio frequency card read-write operation method |
Also Published As
Publication number | Publication date |
---|---|
CN100412880C (en) | 2008-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7382225B2 (en) | Radio frequency identification security system and method | |
US7559468B2 (en) | Reader/writer secure module access control method | |
US9244862B2 (en) | Secure storage device permanently disabled by remote command | |
TWI331304B (en) | Radio frequency identification security system and method | |
CN102436559B (en) | A kind of state switching method and system | |
CN101706853A (en) | Solid state disk (SSD)-based anti-leakage self-destruction system | |
CN1877610A (en) | Non-contact ic apparatus and control method | |
CN1858771A (en) | Radio frequency identifying secrete system and method | |
US9805222B2 (en) | RFID reader discipline | |
CN101064000A (en) | Identification system and identification method | |
CN1235227C (en) | Portable readable and writable memory with USB interface and its data management method | |
CN1251132C (en) | Non-contact IC card and non-contact IC card system | |
CN1484811A (en) | Information processing terminal or method for controlling the terminal | |
CN1494808A (en) | Power management for subscriber identity module | |
CN1503521A (en) | Communication method and apparatus | |
CN1862559A (en) | Method and system of RF identifying safety | |
CN101419577A (en) | Mobile memory apparatus with handwriting identification identity confirming function and implementing method thereof | |
CN203250317U (en) | Mobile memorizer capable of identifying fingerprints | |
CN1687861A (en) | Portable secret computer | |
US20080070629A1 (en) | Method and mobile communication device for resuming a functioning of a subscriber identity module | |
CN104361455A (en) | Enterprise employee information processing method | |
CN1722098A (en) | Retrieval of configuration information from information processing apparatus | |
KR20130139604A (en) | Memory device comprising a plurality of memory chips, authentication system and authentication method thereof | |
US20030229796A1 (en) | System guide device based on flash memory and the implement of guide method | |
CN2852573Y (en) | Mobile terminal with information backup function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080820 Termination date: 20170430 |
|
CF01 | Termination of patent right due to non-payment of annual fee |