EP1053375A1 - A radio frequency identification (rfid) security device - Google Patents

A radio frequency identification (rfid) security device

Info

Publication number
EP1053375A1
EP1053375A1 EP99967218A EP99967218A EP1053375A1 EP 1053375 A1 EP1053375 A1 EP 1053375A1 EP 99967218 A EP99967218 A EP 99967218A EP 99967218 A EP99967218 A EP 99967218A EP 1053375 A1 EP1053375 A1 EP 1053375A1
Authority
EP
European Patent Office
Prior art keywords
key
rfid
radio frequency
frequency identification
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99967218A
Other languages
German (de)
English (en)
French (fr)
Inventor
Youbok Lee
Peter Sorrells
Adrian C. Kuzdas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microchip Technology Inc
Original Assignee
Microchip Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microchip Technology Inc filed Critical Microchip Technology Inc
Publication of EP1053375A1 publication Critical patent/EP1053375A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07345Means for preventing undesired reading or writing from or onto record carriers by activating or deactivating at least a part of the circuit on the record carrier, e.g. ON/OFF switches
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00658Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
    • G07C9/00714Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with passive electrical components, e.g. resistor, capacitor, inductor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00579Power supply for the keyless data carrier
    • G07C2009/00603Power supply for the keyless data carrier by power transmission from lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves

Definitions

  • This invention relates generally to a Radio Frequency Identification (RFID) security device and, more specifically, to an RFID tag device configured as an electronic key which utilizes contact elements to disable the RFID I/O by shorting or breaking the RFID tag device from the antenna or resonant inductor when the key is not inserted into a locking device.
  • RFID Radio Frequency Identification
  • Serial EEPROM based keys require 4 to 5 separate contacts in order to operate. One contact is used for each of power, ground, clock, and data. Two contacts may be used for data transfer (i.e., one as an input contact and one as an output contact). Each of the multiple contacts in the serial EEPROM based key must make proper contact in order to transfer clock and data through them.
  • users returning from a swimming pool may insert a wet key into the lock. This causes poor contact or shorts between the contacts which prevents proper transfer of data, thereby preventing the lock from opening.
  • the wrong polarity of key insertion into the lock will cause damage to the lock electronics or EEPROM device, thereby rendering the key useless.
  • moisture, polarity of insertion, and wear and/or damage to the multiple contacts are problematic in this type of electronic key.
  • a second type of electronic key utilize access control RFID tags.
  • a card or tag is presented to a reading device to gain access to a building.
  • this type of electronic key is used for identification applications rather than for security.
  • Using this type of electronic key for security creates a problem since these types of keys are not very secure. Covert readers, even battery powered readers, can power-up the tag and steal its code without the owner's knowledge, even if the tag is in the owner's pocket or purse.
  • One way to solve the problems associated with access control RFID tags is to have an encrypted electronic key.
  • Several types of electronic keys include encryption algorithms on the die itself. Some encryption algorithms will allow the code on the electronic key to be encrypted and changed every time the key is read. While these types of electronic keys prevent unauthorized "code grabbing", they are considerably more expensive than RFID tag devices. Thus, the security comes at the expense of cost.
  • the improved RFID security device must not require a plurality of contacts for data transfer.
  • the improved RFID security device must further be universal in polarity.
  • the improved RFID security device must be resistant to environmental elements.
  • the improved RFID security device must also be able to be used for security and must further be resistant to "code grabbing".
  • the improved RFID security device would utilize RFID tag devices configured as electronic keys.
  • the improved RFID security device would utilize contacts which would short or open a circuit between the RFID tag memory device and an antenna or resonant inductor whenever the RFID security device is not inserted into a lock, thereby preventing unauthorized people from reading the key via a concealed reader.
  • a Radio Frequency Identification (RFID) security device is disclosed.
  • the RFID security device is an electronic key.
  • the electronic key uses an RFID tag device for storing data on the key.
  • An energizing circuit is coupled to the RFID tag device for providing energy to the RFID tag device and to read the data on the electronic key.
  • the energizing circuit may be a tuned resonant circuit or an antenna.
  • a key contact is coupled, to the energizing circuit. The key contact is used for enabling and disabling the energizing circuit. Once the electronic key is enabled, transmission of the data from the electronic key may occur.
  • a Radio Frequency Identification (RFID) security device is an electronic key.
  • the electronic key uses an RFID tag device for storing data on the key.
  • An energizing circuit is coupled to the RFID tag device for providing energy to the RFID tag device and to read the data on the electronic key.
  • the energizing circuit may be a tuned resonant circuit or an antenna.
  • the RFID security device uses an electronic locking mechanism and an electronic key.
  • the electronic key has an RFID tag device for storing data.
  • An energizing circuit is electrically coupled to the RFID tag device when the electronic key is coupled to the electronic locking mechanism.
  • the energizing circuit may be a tuned resonant circuit or an antenna.
  • the energizing circuit is used for providing energy to the RFID tag device in order to read the data on the electronic key when the electronic key is coupled to the electronic locking mechanism.
  • a key contact is coupled to the energizing circuit for enabling the energizing circuit when the electronic key is coupled to the electronic locking mechanism.
  • the electronic locking mechanism uses a reading device for reading the data transferred from the electronic key when the electronic key is coupled to the electronic locking mechanism.
  • a first inductive element is coupled to the reading device for transmitting a signal to the energizing circuit of the electronic key when the electronic key is coupled to the electronic locking mechanism.
  • a second inductive element is coupled to the first inductive element. Shorting members are coupled to the second inductive element for coupling the second inductive element to the electronic key to form the energizing circuit of the electronic key.
  • Figure 1 is a simplified electrical schematic of a first embodiment of the present invention.
  • Figure 2 is a simplified electrical schematic of a second embodiment of the present invention.
  • Figure 3 is a simplified electrical schematic of a third embodiment of the present invention.
  • Figure 4 is a simplified electrical schematic of a fourth embodiment of the present invention.
  • Figure 5 is a simplified electrical schematic of a fifth embodiment of the present invention.
  • Figure 6 A is a top view of one implementation of the present invention.
  • Figure 6B is an end view of one embodiment of the implementation depicted in Figure 6A.
  • Figure 6C is an end view of a second embodiment of the implementation depicted in Figure 6A.
  • Figure 7 A is a top view of another implementation of the present invention.
  • Figure 7B is an end view of one embodiment of the implementation depicted in Figure 7A.
  • Figure 7C is an end view of a second embodiment of the implementation depicted in Figure 7A.
  • Figure 8 A is a top view of another implementation of the present invention.
  • Figure 8B is a side view of the implementation depicted in Figure 8 A.
  • Figure 8C is an end view of the implementation depicted in Figure 8 A.
  • Figure 9 is a simplified electrical schematic of another embodiment of the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • a first embodiment of an improved electronic key 10 (hereinafter key 10) is shown.
  • the key 10 uses a Radio Frequency Identification (RFID) tag device 12.
  • RFID tag device 12 is programmed to store data on the key 10.
  • the data stored on the RFID tag device 12 will be read by a reading device (not shown) in the locking mechanism. If the proper electronic key 10 has been inserted into the locking mechanism, the locking mechanism will be released.
  • an energizing circuit 14 is coupled to RFID tag device 12.
  • the energizing circuit 14 is used to provide energy to the RFID tag device 12 and to convey the data signal back to the reader.
  • the energizing device may be a tuned resonant circuit or an antenna.
  • the energizing circuit 14 is a tuned resonant circuit 14.
  • the reading device of the locking mechanism will send out a carrier signal.
  • the tuned resonant circuit 14 is tuned to the frequency of the carrier signal.
  • the tuned resonant circuit 14 will take the energy from the carrier signal to power the RFID tag device 12. This will allow the reading device of the locking mechanism to read the data stored on the RFID tag device 12.
  • the tuned resonant circuit 14 is comprised of an inductive element 16 and a capacitive element 18.
  • the inductive element 16 may be any type of inductor such as an antenna or a coil.
  • a contact device 20 is coupled to the tuned resonant circuit 14.
  • the contact device 20 is used for enabling and disabling the tuned resonant circuit 14.
  • the contact device 20 is a normally open contact.
  • a shorting bar in the electronic locking mechanism will close the contact device 20 thereby completing the tuned resonant circuit 14.
  • a second embodiment of the key 10 is shown. This embodiment is very similar to the embodiment depicted in Figure 1. The only difference is that the contact device 20 is used to create an open circuit between the entire tuned resonant circuit 14 and the RFID tag device 12.
  • the key 10 in Figure 2 functions in the same manner as the key 10 shown in Figure 1.
  • the contact device 20 is a normally open contact. When the key 10 is inserted into the electronic locking mechanism, a shorting bar in the electronic locking mechanism will close the contact device 20 thereby completing the tuned resonant circuit 14. Once the tuned resonant circuit 14 is complete, the powering of the RFID tag device 12 and transmission of the data from the key 10 to the electronic locking mechanism is enabled.
  • a third embodiment of the key 10 is shown. This embodiment is very similar to the embodiment depicted in Figures 1 and 2. The main difference is that the capacitive element 18 is located on the RFID tag device 12.
  • the key 10 in Figure 3 functions in the same manner as the key 10 shown in Figures 1 and 2.
  • the contact device 20 is a normally open contact. When the key 10 is inserted into the electronic locking mechanism, a shorting bar in the electronic locking mechanism will close the contact device, 20 thereby completing the tuned resonant circuit 14. Once the tuned resonant circuit 14 is complete, the powering of the RFID tag device 12 and transmission of the data from the key 10 to the electronic locking mechanism is enabled.
  • a fourth embodiment of the key 10 is shown. This embodiment is very similar to the embodiment depicted in Figure 3. The main difference is that in the energizing circuit 14, the inductive element 16 is an antenna. In the preferred embodiment of the present invention, the antenna is a microwave antenna.
  • the key 10 in Figure 4 functions in the same manner as the key 10 shown in Figures 1-3.
  • a fifth embodiment of the key 10 is shown.
  • This embodiment is very similar to the embodiment depicted in Figure 4.
  • the main difference is that the contact device 20 is a normally closed contact device.
  • the normally closed contact device 20 will create a short between the terminals of the energizing circuit 14 thereby disabling the key 10.
  • a nonconductive spacer will spread the shorted contact device 20 apart thereby enabling the energizing circuit 14.
  • FIG. 6A a sixth embodiment of the key 10 is shown. This embodiment is very similar to the embodiment depicted in Figures 3 and 4 wherein the capacitive element is found on the RFID tag device 12, and similar to Figures 1 and 2 wherein the capacitive element 18 is installed on a module external to the RFID tag device 12.
  • the contact device 20 uses a pair of normally open contact elements. The pair of contact elements may be on one or more sides of the key 10.
  • the contact device 20 may protrude from the key 10 or, as may be seen in Figure 6C, the contact device 20 may be embedded in the key 10 such that the contact elements are flush with the key 10.
  • a shorting bar in the electronic locking mechanism will close the contact device 20 thereby completing the energizing circuit 14.
  • the energizing circuit 14 may be a tuned resonant circuit or an antenna. Once the tuned resonant circuit 14 is complete or in the alternative, the RFID tag device 12 is coupled to the antenna, the transmission of the data from the key 10 to the electronic locking mechanism is enabled.
  • a seventh embodiment of the key 10 is shown. This embodiment is very similar to the embodiment depicted in Figures 6A-6C.
  • the contact device 20 also uses a pair of normally open contact elements. However, in this embodiment, one contact element is placed on one side of the key 10 and the second contact element is placed on a second side of the key 10.
  • the contact device 20 may protrude from the key 10, Figure 7B, or, as may be seen in Figure 7C, the contact device 20 may be embedded in the key 10 such that the contact elements are flush with the key 10.
  • the energizing circuit 14 may be a tuned resonant circuit or an antenna. Once the tuned resonant circuit 14 is complete, or in the alternative, the RFID tag device 12 is coupled to the antenna, the transmission of the data from the key 10 to the electronic locking mechanism is enabled.
  • an eighth embodiment of the key 10 is shown. This embodiment is very similar to the embodiment depicted in Figures 7A-7C.
  • the main difference in the embodiment depicted in Figure 8 A is that the contact device 20 uses a pair of normally closed contact elements 22.
  • the normally closed contact elements 22 are generally a pair of normally closed spring contact elements.
  • the key 10 is hollow. When the key 10 is inserted into the electronic locking mechanism, a nonconductive spacer will be inserted into the hollow key 10. The nonconductive spacer will spread apart the pair of normally closed contact elements 22 thereby enabling the energizing circuit 14.
  • the energizing circuit 14 may be a tuned resonant circuit or an antenna. Once the energizing circuit 14 is complete, or unshorted, the transmission of the data from the key 10 to the electronic locking mechanism is enabled.
  • an RFID security system 30 (hereinafter system 30) is shown.
  • the system 30 uses an electronic key 10 and an electronic locking mechanism 40.
  • the electronic key 10 has an RFID tag device 12 which is programmed to store data on the key 10.
  • the RFID tag device 12 further may have the capacitive element 18 located thereon.
  • the capacitive element 18 may be located on the die, module, or may not even be required if using an antenna.
  • the contact device 20 is coupled to the RFID tag device 12.
  • the contact device 20 is a normally open contact.
  • the contact device 20 uses a pair of contact elements.
  • the contact device 20 may protrude from the key 10, Figure 7B, or, as may be seen in Figure 7C, the contact device 20 may be embedded in the key 10 such that the contact elements are flush with the key 10.
  • the electronic locking mechanism 40 uses a reading device 42 for reading the data stored on the RFID tag device 12 of the key 10.
  • the reading device 42 is coupled to an inductive element 44.
  • the reading device 42 will send out a carrier signal via the inductive element 44.
  • the energizing circuit 14 of the electronic key 10 which is located inside the electronic locking mechanism, receives the carrier signal.
  • the energizing circuit 14 will take the energy from the carrier signal and power the RFID tag device 12. This will allow the reading device 42 of the electronic locking mechanism 40 to-read the data stored in the RFID tag device 12.
  • the electronic locking mechanism 40 further has a second inductive element 16.
  • the second inductive element 16 in combination with the capacitive element 18 form the energizing circuit 14.
  • a connecting element 46 is coupled to the second inductive element 16.
  • the connecting element 46 in the electronic locking mechanism 40 will connect to the contact device 20 thereby completing the energizing circuit 14.
  • the energizing circuit 14 it will take the energy from the carrier signal emitted from the inductive element 44 to power the RFID tag device 12.
  • the transmission of the data from the key 10 to the electronic locking mechanism 40 is enabled thereby allowing the reading device 42 of the electronic locking mechanism 40 to read the data stored in the RFID tag device 12.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Lock And Its Accessories (AREA)
  • Near-Field Transmission Systems (AREA)
EP99967218A 1998-12-08 1999-12-07 A radio frequency identification (rfid) security device Withdrawn EP1053375A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US207861 1994-03-08
US20786198A 1998-12-08 1998-12-08
PCT/US1999/028933 WO2000034605A1 (en) 1998-12-08 1999-12-07 A radio frequency identification (rfid) security device

Publications (1)

Publication Number Publication Date
EP1053375A1 true EP1053375A1 (en) 2000-11-22

Family

ID=22772278

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99967218A Withdrawn EP1053375A1 (en) 1998-12-08 1999-12-07 A radio frequency identification (rfid) security device

Country Status (6)

Country Link
EP (1) EP1053375A1 (ja)
JP (1) JP2002531736A (ja)
KR (1) KR20010040777A (ja)
CN (1) CN1293732A (ja)
TW (1) TW512196B (ja)
WO (1) WO2000034605A1 (ja)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101482915B (zh) * 2009-01-21 2011-01-26 宁波大学 一种用于身份识别的射频识别系统

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7161470B2 (en) 2000-01-14 2007-01-09 3M Innovative Properties Company User interface for portable RFID reader
TWM264261U (en) 2004-05-31 2005-05-11 Lian-Feng Lin Lock device featuring with identification and anti-counterfeiting functions
US7345586B2 (en) 2005-06-29 2008-03-18 Motorola Inc System and method for transferring data to an electronic device
ES2350906T3 (es) 2005-07-25 2011-01-28 Fci Dispositivo de conexión eléctrica que comprende unos medios de indicación de estado de emparejamiento.
ES2297980B1 (es) * 2005-07-28 2009-08-25 Clem, S.A. Dispositivo de lectura de llaves codificadas.
US7411500B2 (en) 2005-09-14 2008-08-12 3M Innovative Properties Company Methods of monitoring items or material from manufacturing processes
KR100817141B1 (ko) * 2006-09-08 2008-03-27 세연테크놀로지 주식회사 무선인식 리더기 및 이를 포함하는 부품 공급기
WO2008035296A2 (en) * 2006-09-22 2008-03-27 Koninklijke Philips Electronics N.V. Extended functionality of rfid devices
CN101333892B (zh) * 2008-07-29 2011-12-14 宁波瑞奥光电技术有限公司 一种应用于门锁的rfid系统的安全处理方法
CN101770660B (zh) * 2009-12-31 2015-12-02 上海量科电子科技有限公司 一种射频天线识别钥匙
CN101775922B (zh) * 2009-12-31 2015-11-25 马宇尘 一种射频导路钥匙、锁芯系统及其实现方法
US8699200B2 (en) 2010-02-05 2014-04-15 Honeywell International Inc. Secure non-contact switch
US8456792B2 (en) 2010-02-05 2013-06-04 Honeywell International Inc. Secure non-contact switch
CN102094551B (zh) * 2010-12-29 2013-01-30 东莞市依时利科技有限公司 分离式一次性rfid无源电子标签锁
CN102199953B (zh) * 2011-04-20 2013-04-17 江苏奥英万科技有限公司 一种电子钥匙以及相配套的rfid电子锁
ES2495990T3 (es) * 2011-08-29 2014-09-18 Assa Abloy (Schweiz) Ag Dispositivo de cierre mecatrónico
EP2624081B1 (en) 2012-01-31 2018-01-10 Nxp B.V. Configuration method, configuration device, computer program product and control system
TWI607384B (zh) * 2017-02-16 2017-12-01 RFID chip device and blocking reading unit
CN115263088B (zh) * 2022-06-22 2024-02-27 杭州海康威视数字技术股份有限公司 电子锁、门禁系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2640830B1 (fr) * 1988-12-16 1994-08-26 Levionnais Philippe Dispositif pour l'echange d'informations a distance entre un objet portatif et une station
WO1991014065A1 (de) * 1990-03-07 1991-09-19 Siegfried Sikora Schlosseinheit eines kfz mit ferngesteuert betätigbarem türschloss
GB9105835D0 (en) * 1991-03-19 1991-05-01 Yale Security Prod Ltd Cylinder locks
JP2549774B2 (ja) * 1991-05-22 1996-10-30 株式会社テック 電磁式キースイッチ
DE4327334C1 (de) * 1993-08-15 1995-01-12 Angewandte Digital Elektronik Chipkarte
DE4430360C1 (de) * 1994-08-26 1995-10-05 Siemens Ag Diebstahlschutzsystem für ein Kraftfahrzeug

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0034605A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101482915B (zh) * 2009-01-21 2011-01-26 宁波大学 一种用于身份识别的射频识别系统

Also Published As

Publication number Publication date
TW512196B (en) 2002-12-01
WO2000034605A1 (en) 2000-06-15
KR20010040777A (ko) 2001-05-15
CN1293732A (zh) 2001-05-02
JP2002531736A (ja) 2002-09-24

Similar Documents

Publication Publication Date Title
WO2000034605A1 (en) A radio frequency identification (rfid) security device
US7548164B2 (en) Means to deactivate a contactless device
US7564340B2 (en) RFID-UHF integrated circuit
JP5529954B2 (ja) 電子機械式ロック装置
EP1279140B1 (en) Integrated circuit card and case therefor
US5771722A (en) Dual control mode lock system
US20070200684A1 (en) RFID Device Configured for Data Entry
US20070200680A1 (en) Transaction Card Including Switchable RFID Tag
US20070200679A1 (en) RFID Device Including Multiple RFID Tags
CN101573717A (zh) Rfid设备的扩展功能
JP6140705B2 (ja) 電子機械式ロック装置
WO2007044144A2 (en) A means to deactivate a contactless device
CN110080617B (zh) 数码钥匙系统
WO2000039741A1 (en) A radio frequency identification (rfid) security system having an rf emulating circuit
US20040180637A1 (en) Wireless communication IC and wireless communication information storage medium using the same
JPS62129476A (ja) 個人識別装置
CN214504481U (zh) 一种实现快速卡号读取的门禁装置
KR20070058366A (ko) 비접촉 식별장치
CA2929266A1 (en) Smart rfid electronic lock system
KR200391949Y1 (ko) 알에프아이디칩이 내장된 열쇠
JP3579107B2 (ja) 扉用キー装置
CN2459406Y (zh) 可自制钥匙卡的感应式电子门锁
JP4560326B2 (ja) 入退室管理装置および入退室管理方法
TH47561A3 (th) อุปกรณ์รักษาความปลอดภัยการแสดงเอกลักษณ์ความถี่วิทยุ (rfid)
JP2006041639A (ja) 携帯端末装置

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20000906

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

RIN1 Information on inventor provided before grant (corrected)

Inventor name: KUZDAS, ADRIAN, C.

Inventor name: SORRELLS, PETER

Inventor name: LEE, YOUBOK

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20021231