CN1862559A - Method and system of RF identifying safety - Google Patents

Method and system of RF identifying safety Download PDF

Info

Publication number
CN1862559A
CN1862559A CN 200510071305 CN200510071305A CN1862559A CN 1862559 A CN1862559 A CN 1862559A CN 200510071305 CN200510071305 CN 200510071305 CN 200510071305 A CN200510071305 A CN 200510071305A CN 1862559 A CN1862559 A CN 1862559A
Authority
CN
China
Prior art keywords
electronic installation
sign indicating
indicating number
server
recognition sign
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510071305
Other languages
Chinese (zh)
Other versions
CN100487717C (en
Inventor
林祥璋
沈一弘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Compal Electronics Inc
Original Assignee
Compal Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Compal Electronics Inc filed Critical Compal Electronics Inc
Priority to CNB2005100713052A priority Critical patent/CN100487717C/en
Publication of CN1862559A publication Critical patent/CN1862559A/en
Application granted granted Critical
Publication of CN100487717C publication Critical patent/CN100487717C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention provides a radio-frequency identification safety method and its system. It is characterized by that a preset identification code is set in a server, a reader can be used for receiving a label identification code of a radio-frequency identification label and transferring said label identification code to server, in which said radio-frequency identification label is set in electronic equipment. Then the server can compare the label identification code with said preset identification code, when they are identical, said server can send an opening signal to said electronic equipment so as to open the service authority of said electronic equipment, and they are not identical, said server can send a closing signal to said electronic equipment so as to close the service authority of said electronic equipment.

Description

The RF identifying safety method and system
Technical field
The present invention relates to a kind of radio frequency identification system, and particularly relates to and a kind ofly carry out the hardware of electronic installation and the device and the method for data protection by server and RFID tag.
Background technology
Along with the progress of science and technology, electronic installation develops towards light, thin, short, little direction.But these but very easy quilts of electronic installation with light and handy external form are had the inclination the personage and are stolen.Known security mechanism is by preset password in electronic installation, and for example password input or fingerprint recognition etc. prevent that the stolen taker of electronic installation from using or reading stored data in it.Yet the stealer but may utilize the function that resets of electronic installation, regains the right to use of the electronic installation that is stolen after sacrificing its stored data.That is to say that this known security mechanism perhaps can protect the stored data of electronic installation not leak, but for preventing that electronic installation from there is no any help for being stolen.
On the other hand, these electronic installations with light and handy external form also become the secret worry of information privacy aspect gradually.For instance, generally all control zone can be set, prevent that with the turnover of monitor staff and electronic installation its research and development data from leaking in in-company research and development department.Yet intentionally the personage but can utilize light and handy portable electron device, and for example mobile computer, personal digital assistant, carry-on dish, recording pen or digital camera etc. are carried the turnover control zone secretly, form the security breaches in the information privacy.
Summary of the invention
First technical matters to be solved by this invention provides a kind of RF identifying safety method, but the rights of using of keyholed back plate electronic installation, and strengthen gate inhibition's control ability that it passes in and out a certain regional extent.
According to first preferred embodiment of the present invention, this RF identifying safety method is set a default ID earlier in a server.Receive a tag recognition sign indicating number of a RFID tag by a reader, and the tag recognition sign indicating number is sent to server, wherein RFID tag is disposed in the electronic installation.Then, whether server comparison tag recognition sign indicating number and default ID be identical.When the tag recognition sign indicating number was identical with default ID, server sent a start signal to electronic installation, with the rights of using of unlocking electronic device; When tag recognition sign indicating number and default ID and when inequality, server sends a shutdown signal to electronic installation, to close the rights of using of closing electronic device.
When this tag recognition sign indicating number was identical with this default ID, this RF identifying safety method also comprised step: check by this controller whether this electronic installation exists a start mark; And when this start mark does not exist, allow to open this electronic installation by this controller.And when this tag recognition sign indicating number and this default ID and when inequality, this RF identifying safety method also comprises step: check by this controller whether this electronic installation exists a start mark; And when this start mark exists, close this electronic installation and do not allow by this controller and start shooting again.
Second technical matters to be solved by this invention provides a kind of radio frequency identification security system, the hardware and the data of protection electronic installation, and can carry out safety control, to prevent that hardware or data are by unauthorized theft.
According to second preferred embodiment of the present invention, this radio frequency identification security system comprises an electronic installation, a reader and a server.Electronic installation has a RFID tag, and the corresponding tag recognition sign indicating number of this RFID tag.Reader is in order to receive the tag recognition sign indicating number.Server has a default ID, receives above-mentioned tag recognition sign indicating number via reader, and relatively whether tag recognition sign indicating number and default ID be identical.When the tag recognition sign indicating number was identical with default ID, server sent a start signal to electronic installation, with the rights of using of unlocking electronic device; When tag recognition sign indicating number and default ID and when inequality, server sends a shutdown signal to electronic installation, to close the rights of using of closing electronic device.
In the above-mentioned radio frequency identification security system, this controller is an embedded controller, and this electronic installation is a portable electron device.
In the above-mentioned radio frequency identification security system, this electronic equipment also comprises a timing unit, after this tag recognition sign indicating number is sent to this server, this timing unit begins to calculate a time value, and this controller is after this time value surpasses a schedule time, to close the rights of using of this electronic installation, when this electronic installation received this start signal before this time value surpasses this schedule time, this timing unit stopped to calculate this time value again.
The 3rd technical matters to be solved by this invention provides a kind of RF identifying safety method, at least comprise step: send trigger pip to a RFID tag via a reader, begin to calculate a time value with a timing unit that starts an electronic installation, wherein this RFID tag is disposed in this electronic installation; And after this time value surpassed a schedule time, a controller of this electronic installation cut out the rights of using of this electronic installation.
Above-mentioned RF identifying safety method wherein also comprises the following step: receive a tag recognition sign indicating number of a RFID tag by this reader, and this tag recognition sign indicating number is sent to a server, and include a default ID in this server; Whether this server relatively this tag recognition sign indicating number is identical with this default ID; And when this tag recognition sign indicating number was identical with this default ID, this server sent a start signal to this RFID tag, and the rights of using of opening this electronic installation via this controller.
Above-mentioned RF identifying safety method also comprises step: when this electronic installation receives this start signal before this time value surpasses this schedule time, stop to calculate this time value.
The invention has the beneficial effects as follows, because the present invention adopts contactless automatic identification technology, but the rights of using of keyholed back plate electronic installation, and strengthen gate inhibition's control ability that it passes in and out a certain regional extent, to reach the administrative purposes of compartmentalization.
Description of drawings
For above and other objects of the present invention, feature, advantage and embodiment can be become apparent, accompanying drawing is described in detail as follows:
Fig. 1 is the synoptic diagram that illustrates the present invention's first preferred embodiment;
Fig. 2 is the synoptic diagram that illustrates the electronic installation in the present invention's first preferred embodiment;
Fig. 3 is the method flow diagram that illustrates the present invention's first preferred embodiment;
Fig. 4 is the method flow diagram that illustrates the present invention's second preferred embodiment;
Fig. 5 is the synoptic diagram that illustrates the electronic installation in the present invention's second preferred embodiment; And
Fig. 6 is the method flow diagram that illustrates the present invention's second preferred embodiment.
The number in the figure explanation:
100: radio frequency identification security system
110: electronic installation
120: reader
130: server
212: RFID tag
214: controller
510: electronic installation
516: timing unit
Embodiment
Radio frequency identification (Radio Frequency Identification; RFID), be a kind of contactless automatic identification technology, it is to utilize the automatic recognition objective thing of radiofrequency signal and obtain relevant information, operates quick and conveniently, identification maneuver need not manually get involved, and can discern dynamic object and can discern a plurality of labels simultaneously.Radio frequency identification be one handy, simple and practical and be particularly suitable for the technology of robotization control, it both can be used for the pattern that only reads, also can be used for read-write mode.
The complete radio frequency identification system of one cover is made up of reader (Reader) and identification controller (Transponder) two parts, and wherein identification controller is also referred to as RFID tag (RFIDTag) usually.The operating principle of radio frequency identification system is to launch the radio wave energy of a characteristic frequency to RFID tag by reader earlier, send inner identification code (IDCode) in order to drive RFID tag, or also can initiatively send this identification code by RFID tag.Reader then receives this identification code, delivers to central processing system again and carries out relevant data processing.
The present invention utilizes the wireless transmission of radio-frequency recognition system and the advantage of quick access, carries out hardware and Data Protection at electronic installation, and can carry out the safety control in a certain regional extent, to improve the problem that known hardware or data are stolen.
Fig. 1 is the synoptic diagram that illustrates the present invention's first preferred embodiment.As shown in Figure 1, this radio frequency identification security system 100 comprises at least one electronic installation 110, at least one reader 120 and a server 130.Each electronic installation 110 respectively comprises a RFID tag, and this RFID tag has the tag recognition sign indicating number of representing this electronic installation 110.Reader 120 is in order to receive the tag recognition sign indicating number.Server 130 has a default ID, receives above-mentioned tag recognition sign indicating number via reader 120, and relatively whether tag recognition sign indicating number and default ID be identical.When the tag recognition sign indicating number was identical with default ID, server 130 sent a start signal to electronic installation 110, with the rights of using of unlocking electronic device 110; When tag recognition sign indicating number and default ID and when inequality, server 130 sends a shutdown signal to electronic installation 110, to close the rights of using of closing electronic device 130.
Electronic installation 110 can be portable electron device or other has the electronic installation of switching function.In this preferred embodiment, this electronic installation 110 is a portable electron device, for example can be mobile computer, PDA(Personal Digital Assistant), mobile phone, carry-on dish, digital camera or other electronic installation that is available for users to carry.
Fig. 2 is the synoptic diagram that illustrates the electronic installation in the present invention's first preferred embodiment.As shown in Figure 2, this electronic installation 110 comprises a RFID tag 212 and a controller 214.Server 130 sends start signal or shutdown signal to this RFID tag 212 via reader 120.Perhaps, server 130 also can electrically connect via network (for example wireless network) or other and send start signal or shutdown signal to this electronic installation 110.214 rights of using of opening or closing closing electronic device 110 according to start signal or shutdown signal of controller.
And this controller 214 is except independent configuration, because the portable electron device that the present invention's first preferred embodiment is lifted, its inside comprises embedded controller (Embedded Controller usually; EC), therefore also controller 214 can be integrated in the embedded controller of The built-in.On the other hand, except RFID tag 212 is attached at the electronic installation 110 with the form that adds, also the part assembly of RFID tag 212 can be integrated in the embedded controller, and selectively arrange in pairs or groups 110 of the electronic installations antenna (for example blue bud antenna or WLAN antenna) and the power supply units of configuration originally, so can will be built in the RFID tag 212 among the electronic installation 110.
And embedded controller usually can be in order to the switching on and shutting down program and the default of control electronic installation 110, for example battery settings, setting backlight, power saving setting or play-over etc.Therefore, when electronic installation 110 was in off-mode, above-mentioned start signal can be a startup password at this moment, with unlocking electronic device 110.Similarly, when electronic installation 110 was in park mode, above-mentioned start signal can be a dormancy return signal or a password at this moment, made electronic installation 110 return back to normal mode of operation from park mode.
Fig. 3 is the method flow diagram that illustrates the present invention's first preferred embodiment, so that RF identifying safety method of the present invention to be described.In order to clearly demonstrate this preferred embodiment, below explanation please refer to Fig. 1, Fig. 2 and Fig. 3.This RF identifying safety method is set a default ID (step 301) earlier in server 130.Receive a tag recognition sign indicating number (step 302) of a RFID tag 212 by reader 120, and the tag recognition sign indicating number is sent to server 130 (step 303), wherein RFID tag 212 is disposed in the electronic installation 110.
Then, relatively tag recognition sign indicating numbers and default ID whether identical (step 304) of server 130.When the tag recognition sign indicating number was identical with default ID, server 130 sent a start signal to electronic installation 110, with the rights of using (step 306) of unlocking electronic device 110; When tag recognition sign indicating number and default ID and when inequality, server 130 sends a shutdown signal to electronic installation 110, to close the rights of using (step 308) of closing electronic device 110.
Below be described more specifically the present invention's first preferred embodiment and how in server 130, set default ID.At first, the system operator of this radio frequency identification security system 100, the security information departmental staff of company for example, can directly set the rights of using of each electronic installation 110 from server 130, the electronic installation 110 pairing tag recognition sign indicating numbers that are about to have rights of using directly are set at default ID.At this moment, this radio frequency identification security system 100 is applicable to the situation of electronic installation 110 in a certain regional extent of system operator keyholed back plate.System operator can be installed the diverse location of a plurality of readers 120 in this regional extent, to reach the administrative purposes of compartmentalization.
Perhaps, the user also can pass through network (for example wireless network) or other equipment that is fit to, and provides a certain electronic installation 110 pairing tag recognition sign indicating numbers to server 130.Server 130 is then according at that time setting, simple record, or check whether this tag recognition sign indicating number is positioned on the permission list, even report to system operator requirement ruling etc., the tag recognition sign indicating number that will write down or permit is set at default ID again.
At this moment, this radio frequency identification security system 100 is applicable to the robotization entrance guard management.For instance, the user promptly when the gateway of this regional extent, must file an application to server 130 earlier before leaving or enter the regional extent of control with electronic installation 110.Whether 130 of servers are responsible for this electronic installation 110 of control and still can be used after the regional extent of leaving or entering this control.If not all right, then server 130 can be closed the rights of using of this electronic installation 110, to protect hardware and to prevent that data from leaking.
Fig. 4 is the method flow diagram that illustrates the present invention's second preferred embodiment.Compare with first preferred embodiment shown in Figure 3, second preferred embodiment increases the checking mechanism of start mark.The user can further provide the corresponding action of maintaining secrecy at residing at that time start of electronic installation 110 or off-mode.
In order to clearly demonstrate second preferred embodiment of the present invention, below explanation please refer to Fig. 1, Fig. 2 and Fig. 4.This RF identifying safety method is set a default ID (step 401) earlier in server 130.Receive a tag recognition sign indicating number (step 402) of a RFID tag 212 by reader 120, and the tag recognition sign indicating number is sent to server 130 (step 403), wherein RFID tag 212 is disposed in the electronic installation 110.Whether server 130 relatively tag recognition sign indicating numbers and default ID identical (step 404).
Then, no matter whether the tag recognition sign indicating number is identical with default ID, second preferred embodiment all can be carried out the inspection step of a start mark (flag), to confirm whether electronic installation 110 is in open state (step 406 and 408) at this moment.If the start mark exists, represent that then this electronic installation 110 is in open state; Otherwise,, represent that then this electronic installation 110 is in off-mode if the start mark does not exist.
When the tag recognition sign indicating number is identical with default ID, and the start mark then continues to maintain open state (step 416) with this electronic installation 110 when existing.When the tag recognition sign indicating number is identical with default ID, and the start mark then allows to open this electronic installation 110 (step 426) when not existing.And, as mentioned above, this start signal selectively comprises startup password or default instruction, to make things convenient for manipulating of user, wherein startup password is input when start, default instruction then is that can to select be Auto Power On when the tag recognition sign indicating number is relatively finished, or the user exempts to input password when starting shooting voluntarily and logins automatically.On the other hand, when tag recognition sign indicating number and default ID and inequality, and when the start mark exists, then close the rights of using of this electronic installation 110, promptly close this electronic installation and do not allow start shooting again (step 418), also can be set at and close this electronic installation immediately, or forbid opening this electronic installation once more after the shutdown.When tag recognition sign indicating number and default ID and inequality, and the start mark then maintains off-mode (step 428) with this electronic installation 110 when not existing.
Fig. 5 is the synoptic diagram that illustrates the electronic installation in the present invention's second preferred embodiment, and Fig. 6 then is the method flow diagram that illustrates second preferred embodiment.Compare with preferred embodiment shown in Figure 1, second preferred embodiment adds a timing unit 516 in electronic installation 510.When this reader 120 sends a trigger pip to this RFID tag 212, the tag recognition sign indicating number can be sent to server 130 by reader 120, and timing unit 516 can begin to calculate a time value, and controller 214 closes the rights of using of closing electronic device 510 after this time value surpasses a schedule time.That is to say that the timing unit 516 of second preferred embodiment is responsible for countdowning to close the rights of using of this electronic installation 510.In addition, this timing unit 516 also can be built in the above-mentioned embedded controller in controller 214.
In particular, second preferred embodiment is after the tag recognition sign indicating number is sent to server, make electronic installation enter the shutdown programm of countdowning earlier, again by after start signal remove the shutdown programm that this countdowns, so prevention have the inclination the personage by fast speed belt from electronic installation to evade the shutdown signal that server is sent.Therefore, second preferred embodiment is specially adapted to the management of portable electron device in the high security zone, for example reader 120 is configured in the outlet etc. of the regional extent of control.So, each leaves the electronic installation 510 of this outlet, all must could still can continue to be used after leaving this regional extent after server 130 is confirmed by the reader 120 that is positioned at outlet.
In order to clearly demonstrate the present invention's second preferred embodiment, below explanation please refer to Fig. 5 and Fig. 6.This RF identifying safety method is set a default ID (step 601) earlier in server 130.Receive a tag recognition sign indicating number of a RFID tag 212 by reader 120, and the tag recognition sign indicating number is sent to server 130 (step 602).This server sends a trigger pip to this RFID tag via this reader, begins to calculate a time value (step 603) with a timing unit that starts this electronic installation, and judges then whether this time value surpasses a schedule time (step 604).After time value surpasses a schedule time, promptly close the rights of using (step 605) of closing electronic device 510.Under this situation, even if having the inclination the personage come round too fast speed belt from electronic installation to attempt to evade the shutdown signal that server is sent, this electronic installation 510 has but entered the shutdown programm of countdowning in advance, the possibility that can anti-blocking up hill and dale data leaks.
On the other hand, when time value did not surpass this schedule time, controller 214 can judge whether to receive the start signal (step 606) that server 130 is sent.If do not receive this start signal, then controller 216 can make timing unit 516 continue to calculate this time value, and whether the line time value of going forward side by side surpasses the judgement (step 604) of the schedule time.If when receiving start signal before time value surpasses the schedule time, then open rights of using (step 607), promptly controller 214 can be ordered timing unit 516 values of holding the clock, and removes the computing mode of its time value.Therefore, the present invention's second preferred embodiment significantly the reinforced region scope gate inhibition's control ability of electronic installation turnover and is guaranteed that the user must could use the electronic installation that leaves this regional extent under permission status.
Though the present invention with preferred embodiment openly as above; yet it is not in order to limit the present invention; any technician who has the knack of this technology; without departing from the spirit and scope of the present invention; various changes and the retouching done; all should belong within the application protection domain of the present invention, so protection scope of the present invention should be looked the protection domain that claim defines and is as the criterion.

Claims (10)

1. RF identifying safety method is characterized in that it comprises the following step:
A. received a tag recognition sign indicating number of a RFID tag by a reader, and this tag recognition sign indicating number is sent to a server, wherein this RFID tag is disposed at an electronic installation, and includes a default ID in this server;
B. relatively whether this tag recognition sign indicating number is identical with this default ID for this server;
B1. when this tag recognition sign indicating number was identical with this default ID, this server sent a start signal to this RFID tag, and the rights of using of opening this electronic installation via a controller of this electronic installation; And
B2. when this tag recognition sign indicating number and this default ID and when inequality, this server sends a shutdown signal to this RFID tag, and closes the rights of using of this electronic installation via a controller of this electronic installation.
2. RF identifying safety method as claimed in claim 1 is characterized in that among the described step b1 that when this tag recognition sign indicating number was identical with this default ID, this RF identifying safety method also comprised:
B11. check by this controller whether this electronic installation exists a start mark; And
B12. when this start mark does not exist, allow to open this electronic installation by this controller.
3. RF identifying safety method as claimed in claim 1 is characterized in that among the described step b2 that this RF identifying safety method also comprises when this tag recognition sign indicating number and this default ID and when inequality:
B21. check by this controller whether this electronic installation exists a start mark; And
B22. when this start mark exists, close this electronic installation and do not allow by this controller and start shooting again.
4. radio frequency identification security system is characterized in that it comprises:
One electronic installation has a RFID tag, and the corresponding tag recognition sign indicating number of this RFID tag;
One reader is electrically connected this electronic installation, in order to receive this tag recognition sign indicating number; And
One server, be electrically connected this reader, has a default ID, receive this tag recognition sign indicating number from this reader, and relatively whether this tag recognition sign indicating number is identical with this default ID, wherein when this tag recognition sign indicating number was identical with this default ID, this server sent a start signal to this electronic installation, and the rights of using of opening this electronic installation via a controller of this electronic installation; When this tag recognition sign indicating number and this default ID and when inequality, this server sends a shutdown signal to this electronic installation, and closes the rights of using of this electronic installation via this controller.
5. radio frequency identification security system as claimed in claim 4 it is characterized in that described controller is an embedded controller, and this electronic installation is a portable electron device.
6. radio frequency identification security system as claimed in claim 4, it is characterized in that described electronic equipment also comprises a timing unit, after this tag recognition sign indicating number is sent to this server, this timing unit begins to calculate a time value, and this controller will cut out the rights of using of this electronic installation after this time value surpasses a schedule time.
7. radio frequency identification security system as claimed in claim 6 is characterized in that this timing unit stops to calculate this time value when this described electronic installation receives this start signal before this time value surpasses this schedule time.
8. RF identifying safety method is characterized in that it comprises:
A. send trigger pip to a RFID tag via a reader, begin to calculate a time value with a timing unit that starts an electronic installation, wherein this RFID tag is disposed in this electronic installation; And
B. after this time value surpassed a schedule time, a controller of this electronic installation cut out the rights of using of this electronic installation.
9. RF identifying safety method as claimed in claim 8 is characterized in that described step a also comprises the following step afterwards:
A1. receive a tag recognition sign indicating number of a RFID tag by this reader, and this tag recognition sign indicating number is sent to a server, and include a default ID in this server;
A2. relatively whether this tag recognition sign indicating number is identical with this default ID for this server; And
A3. when this tag recognition sign indicating number was identical with this default ID, this server sent a start signal to this RFID tag, and the rights of using of opening this electronic installation via this controller.
10. RF identifying safety method as claimed in claim 8 is characterized in that also comprising before the described step b:
B1. when this electronic installation receives this start signal before this time value surpasses this schedule time, stop to calculate this time value.
CNB2005100713052A 2005-05-09 2005-05-09 Method and system of RF identifying safety Expired - Fee Related CN100487717C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100713052A CN100487717C (en) 2005-05-09 2005-05-09 Method and system of RF identifying safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100713052A CN100487717C (en) 2005-05-09 2005-05-09 Method and system of RF identifying safety

Publications (2)

Publication Number Publication Date
CN1862559A true CN1862559A (en) 2006-11-15
CN100487717C CN100487717C (en) 2009-05-13

Family

ID=37389985

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100713052A Expired - Fee Related CN100487717C (en) 2005-05-09 2005-05-09 Method and system of RF identifying safety

Country Status (1)

Country Link
CN (1) CN100487717C (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100449569C (en) * 2007-03-23 2009-01-07 东莞市太平洋计算机科技有限公司 Active radio frequency electronic label power-controlling method
CN101089869B (en) * 2006-06-15 2010-04-14 晨星半导体股份有限公司 Method and apparatus for computer login security using RFID technology
CN101438330B (en) * 2005-04-07 2010-11-24 微软公司 Method and system for setup of, and communication with, an RFID middleware server from an enterprise resource planning system server
CN102202294A (en) * 2010-03-23 2011-09-28 纬创资通股份有限公司 Data encryption method and wireless communication system
CN101996430B (en) * 2009-08-28 2014-03-05 中国移动通信集团公司 Method, system and device for swiping entrance guard card through short message service reservation
CN104077903A (en) * 2013-09-06 2014-10-01 苏州天鸣信息科技有限公司 Positioning-based unlock device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101438330B (en) * 2005-04-07 2010-11-24 微软公司 Method and system for setup of, and communication with, an RFID middleware server from an enterprise resource planning system server
CN101089869B (en) * 2006-06-15 2010-04-14 晨星半导体股份有限公司 Method and apparatus for computer login security using RFID technology
CN100449569C (en) * 2007-03-23 2009-01-07 东莞市太平洋计算机科技有限公司 Active radio frequency electronic label power-controlling method
CN101996430B (en) * 2009-08-28 2014-03-05 中国移动通信集团公司 Method, system and device for swiping entrance guard card through short message service reservation
CN102202294A (en) * 2010-03-23 2011-09-28 纬创资通股份有限公司 Data encryption method and wireless communication system
CN104077903A (en) * 2013-09-06 2014-10-01 苏州天鸣信息科技有限公司 Positioning-based unlock device
CN104077903B (en) * 2013-09-06 2018-06-01 中兴耀维科技江苏有限公司 One kind is based on positioning tripper

Also Published As

Publication number Publication date
CN100487717C (en) 2009-05-13

Similar Documents

Publication Publication Date Title
US7382261B2 (en) Radio frequency identification security system and method
US10467832B2 (en) Configurable digital badge holder
US7382225B2 (en) Radio frequency identification security system and method
CN1862559A (en) Method and system of RF identifying safety
US8112807B2 (en) Systems, methods, and apparatuses for erasing memory on wireless devices
US20070034686A1 (en) Protection of non-promiscuous data in an rfid transponder
EP1643407A1 (en) Method for disabling a computing device based on the location of the computing device
US9471757B2 (en) Radio frequency identifiers for providing user access to computing resources
CA2556299A1 (en) Using promiscuous and non-promiscuous data to verify card and reader identity
US20070037566A1 (en) Prohibiting radio frequency transmissions in a restricted environment
WO2014083436A2 (en) Intercom system using an nfc communication device
US8051476B2 (en) Method and system for accessing a secure area
CN101840592B (en) IC (Integrate Circuit) card access terminal adopting commercial cipher and operation method thereof
CN104317668A (en) Malicious operation identifying method and device for mobile terminal
CN1387638A (en) Wireless security access management for portable data storage cartridge
KR20100043561A (en) Apparatus and method for security managing of information terminal
CN101031924A (en) Theft protection for wireless device and content protection thereof
WO2017196319A1 (en) Electronic device access control
CN202771508U (en) Data processing equipment, server and system based on filing cabinet control
CN1235227C (en) Portable readable and writable memory with USB interface and its data management method
CN103473512B (en) A kind of mobile memory medium management method and device
US20110296530A1 (en) Electronic reading apparatus and the data security method thereof
US20140181963A1 (en) Electronic device and file protection method
JP2007012049A (en) Controlling access to workstation system via wireless communication
JP2006277645A (en) Illicit use prevention system and illicit use recording system for computer

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090513

Termination date: 20170509