EP1684238A1 - Identification method and system and device therefor - Google Patents

Identification method and system and device therefor Download PDF

Info

Publication number
EP1684238A1
EP1684238A1 EP05100391A EP05100391A EP1684238A1 EP 1684238 A1 EP1684238 A1 EP 1684238A1 EP 05100391 A EP05100391 A EP 05100391A EP 05100391 A EP05100391 A EP 05100391A EP 1684238 A1 EP1684238 A1 EP 1684238A1
Authority
EP
European Patent Office
Prior art keywords
identification data
rfid tag
characterized
carrier
body
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP05100391A
Other languages
German (de)
French (fr)
Inventor
Rudolf Ritter
Eric Lauper
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Swisscom (Schweiz) AG
Original Assignee
Swisscom Mobile AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Swisscom Mobile AG filed Critical Swisscom Mobile AG
Priority to EP05100391A priority Critical patent/EP1684238A1/en
Publication of EP1684238A1 publication Critical patent/EP1684238A1/en
Application status is Ceased legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • G07C2009/00095Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically comprising a biometric sensor on the pass

Abstract

Identifying operator involves providing a radio frequency identification tag that comprises a memory module (32), where the memory module comprises identification data and a request to a control module is transferred over a contactless interface and identification data of a carrier is acquired. The identification data is compared within the memory module and identity of the carrier is validated by a verification module (33). Independent claims are also included for: (1) a system for identifying an operator (2) an implantable radio frequency identification (RFID) tag comprising a memory module.

Description

  • The present invention relates to an identification method and a system and a device suitable therefor. In particular, the present invention relates to a method, a system and a device for user identification by means of an implantable RFID tag, wherein the identity of the carrier is checked by means of a verification module.
  • Radio Frequency Identification (RFID) is a technology for the clear and contactless identification of objects, goods, animals or persons. It enables fast and automatic data acquisition by means of radio waves, so that the information can be read out and transmitted much faster and more conveniently. An RFID system consists essentially of one or more RFID chips or tags and the appropriate RFID reader. RFID tags are usually flat chips of different sizes that can send data to a reader via radio waves via an antenna. In addition, they have one or more memory devices, which can store different amounts of data depending on the version. In addition, there are basically two types of RFID tags: active and passive. While the active tags are equipped with their own power supply and transmit until they are exhausted, the antenna not only provides the transmission but also the power supply for some RFID tags. With this antenna, the tag, stimulated by the reader, can generate the required energy for data transmission practically by itself. These passive chips have an almost infinite lifetime.
  • RFID technology opens up new practical areas of application, especially in logistics, material management, industrial automation and service. For example, it is possible to store on the chips the price of a good, its expiry date, the place of manufacture, middleman, the time of import and much more, and to read it as needed. But RFID technology, for example, also provides valuable services for finding lost pets by putting animals under the skin with so-called RFID transponders. These microchips store a recognition number. If a lost animal at a Veterinarian or a shelter, the identification number can be read with an adequate device, with which then the animal can be identified via a pet registry and returned to its owner.
  • However, RFID technology is also playing an increasingly important role in the field of identification of persons, especially since the development of implantable RFID chips. There are rice-grain-sized, glass-enclosed RFID transponders today, which can be injected under local anesthesia painlessly under the human skin and are not visible to the eye. This radio-enabled RFID transponder contains an individual and only once occurring identity number. When the RFID tag is held near a scanner, it emits this personal identity number thanks to a weak current emitted by the scanner. In this case, the useful signal is modulated by the supply signal, whereby a bidirectional communication is possible.
  • Key areas of implantable RFID tag adoption include health, finance and security where rapid and unambiguous person identification on the one hand and exclusion of unauthorized persons on the other hand is required. In the area of finance, the use of RFID chips is intended to provide additional security to bank customers and credit card users, that their accounts will only become usable when they personally seek access and are physically present during the transactions. These chips are also recommended to better secure access to government buildings, nuclear facilities, research laboratories, key offices, prisons, and transportation facilities such as airports and airplanes, ships, and valuables or secret material.
  • The disadvantages of these RFID systems are, in particular, that there is no guarantee that an RFID tag with personal identification data will actually be carried by the person referenced on the RFID tag. RFID tags can be easily injected under the skin or otherwise placed, but also easily removed accordingly and be implanted with another person. For example, unauthorized persons may gain access to high-security facilities or use foreign identities to make payments with their credit cards.
  • It is therefore an object of the present invention to propose a new method, a new system and a new device for user identification, which do not have the disadvantages of the prior art. Users can be understood in particular users of mobile communication devices, but also other people and all other living beings.
  • According to the present invention, these objects are achieved in particular by the elements of the independent claims. Further advantageous embodiments are also evident from the dependent claims and the description.
  • In particular, these objects are achieved by the invention in that it is transmitted from an interrogation device via a contactless interface of the RFID tag a request to a control module of the RFID tag that by means of the control module stored in a RFID tag associated storage module identification data is accessed, and that the identification data are transmitted via the contactless interface, wherein by means of the RFID tag associated measuring device or a sensor and / or by means of an analysis device body-specific identification data of the carrier detected and transmitted to a verification module, and wherein by means of the verification module transmitted body-specific identification data of the carrier are compared with the stored in the memory module identification data and the identity of the carrier is confirmed by means of the verification module. The detection of body-specific identification data of the carrier and the verification of the identity of the carrier by comparing the transmitted body-specific identification data with the identification data stored in the memory module has, inter alia, the advantage that the user identification can be particularly simple and secure. In particular, it can be ensured that the carrier of the RFID tag actually also references the one on the RFID tag Person, which significantly limits the possibility of identity theft or fraud.
  • In an embodiment variant, the verification module is assigned to the RFID tag. This embodiment variant has the advantage, inter alia, that the detected body-specific identification data can be processed after the detection within the RFID tag, where the stored reference identification data are located. As a result, the comparison of the acquired and stored identification data and the associated identification check is carried out in a particularly efficient manner.
  • Preferably, the stored within the RFID tag reference identification data according to the principle of a disposable mechanism immediately after the installation of the RFID tags are detected and stored. This procedure prevents the RFID tag from being transplanted from one living being to the next.
  • In a further embodiment, the measuring device or sensor and / or the analysis device are integrated into the RFID tag. This embodiment variant has the advantage, inter alia, that the detection of the body-specific data, which is required for the identification check, takes place within the RFID tag, thus enabling a faster identification. In addition, in this embodiment, the detected body-specific identification data never leave the RFID tag, which leads to an increased level of security, since it is often difficult to get at this identification data for the purpose of fraud.
  • In a further embodiment variant, the identity of the carrier is confirmed by means of the verification module, if the probability of a correspondence of the transmitted body-specific identification data to certain stored identification data lies above a predefinable threshold value. This embodiment variant has, inter alia, the advantage that the degree of agreement of the recorded and stored body-specific identification data can be set depending on the application and need.
  • In a further embodiment, the identity of the carrier is confirmed by means of the verification module, if the transmitted body-specific identification data with the specific stored identification data match one another. This embodiment variant has, inter alia, the advantage that particularly precise identification mechanisms and particularly clear body-specific identification data can be used, which can play a very important role, for example, in access identification to very security-sensitive rooms and / or facilities.
  • In a further embodiment, the RFID tag is injected under the skin of the wearer and / or set. This embodiment variant has the advantage, among other things, that the RFID tag is always worn and the user does not have to worry about the identification means such as identity, stamp or chip cards. Also, an RFID tag placed under the skin can not be lost or stolen, while abusive abduction also makes it much more difficult. As a rule, the installation of the RFID tag leaves no traces on the skin, so that the location of the RFID tag can not be easily determined.
  • In a further embodiment variant, the body-specific identification data comprise DNA and / or blood value-specific data. This embodiment variant has, inter alia, the advantage that humans can be identified on the basis of these body-specific characteristics with a very good or, in the case of DNA, almost perfect safety. This further reduces or even eliminates the risks of identity theft and incorrect identification of users.
  • In a further embodiment, the body-specific identification data comprise a DNA signature and / or a hash of the DNA structure. This embodiment variant has the advantage, inter alia, that the DNA signature or hash of the DNA structure enable a very secure and unambiguous identification, whereby the forgery or identity theft are eliminated.
  • In a further embodiment variant, the identification data transmitted via the contactless interface are encrypted by means of an encryption module. This embodiment variant has, inter alia, the advantage that the security of the user identification is considerably increased by the encryption of the transmitted data, whereby the potentially highly susceptible and eavesdropping transmission of data is secured against possible attacks. Data encryption may be based on symmetric or asymmetric encryption techniques.
  • In yet another embodiment variant, the identification data transmitted via the contactless interface comprise authentication data for authentication in a mobile radio network, in particular IMSI and / or MSISDN. This embodiment variant has, inter alia, the advantage that the users of mobile services are authenticated and authorized in a convenient and secure manner. In addition, users are not tied to a particular mobile device, but can use any device with the appropriate interfaces for its specific security features.
  • In a further embodiment variant, the memory module assigned to the RFID tag comprises multiple identities. This embodiment variant has the advantage, inter alia, that different identities can be used for different security applications and functions. In particular, this can also ensure the anonymity of the users, since in principle every identification request can use a different identity, for example a pseudo-random generator, making it much more difficult to use the identity of the user abusively. In principle, therefore, both the identity of a user can be queried, but also his identification can be checked and confirmed. Multiple identities are possible, typically one identity per system is used.
  • It should be noted at this point that, in addition to the method according to the invention, the present invention also relates to a system for carrying out this method as well as the device suitable therefor.
  • Hereinafter, embodiments of the present invention will be described by way of examples. The examples of the embodiments are illustrated by the following attached figure:
    • FIG. 1 shows a block diagram, which schematically illustrates a method and a system for user identification in a mobile radio network, as well as an identification device suitable therefor.
    • Figure 1 illustrates an architecture that may be used to implement the user identification according to the invention. FIG. 1 shows a block diagram which schematically illustrates an identification method according to the invention and a system for user identification, as well as a device suitable therefor. In Figure 1, the reference numeral 1 refers to a mobile communication terminal. Among mobile communication terminals 1 include all possible so-called. Customer Premise Equipment (CPE) to understand, on the one hand mobile phones, such as GSM, UMTS or satellite mobile phones, but on the other hand, all IP-capable devices include, such as Personal Computers (PC) Personal Digital Assistants (PDA), portable computers (laptops) or game consoles such as Playstation®, Xbox®, Gameboy® or Gamecube®.
  • In particular, the mobile communication terminal 1 is equipped with a physical network interface 13, by means of which voice and / or data information between the mobile communication terminal 1 and a communication network 4 can be exchanged via the communication channel 6. The network interface 13 may support several different network standards, such as Global System for Mobile Communication (GSM), General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), or satellite communication systems. The interface 13 may also be an interface to local wireless networks, such as Wireless Local Area Network (WLAN) 802.11, Bluetooth, Infrared network, or any other non-contact interface. The interface may also be any contact interface, such as a USB or Firewire interface, or an interface to Ethernet, Token Ring, or any other wired device LAN (Local Area Network) or Internet based on analog, digital or xDLS modem connection. The reference number 4 in FIG. 1 stands for the various communication networks, for example land or satellite-based mobile radio network, PSTN (public switched telephone network), WLAN 802.11 or Bluetooth network, Ethernet or token ring, etc.). Basically, it must be emphasized that the inventive identification method and / or system, as well as the inventive identification device is not bound to a specific network standard, provided that the inventive features are present, but can be realized with one or more arbitrary networks, in particular by the mobile communication device 1 transparently switches between the different networks 4 or routes. In particular, in this regard, the mobile communication device 1 may meet the specifications of standards for seamless switching of voice and data media services, such as Unlicensed Mobile Access (UMA) for the seamless transition between WLAN, GSM / GPRS and Bluetooth, SCCAN (Seamless Converged Communication Across Networks ) or Bluephone support.
  • In addition, the mobile communication device 1 is connected via a contact-type interface to an identification module 14, which is used, for example, to identify the mobile communication device 1 in the mobile radio network 4. In particular, this identification module 14 may be a SIM card (Subscriber Identity Module), which may include carrier-relevant data. The mobile communication device 1 also has input elements 12, by means of which data and / or commands can be input for use and / or execution on the mobile communication device 1 or for transmission via the communication interface 13. In addition, the mobile communication device 1 comprises the output elements 15, which for the output and / or reproduction of acoustic and / or optical signals as well as image and / or sound data to the carrier 2 can be used. In addition, the mobile communication device 1 comprises a further physical interface 11, by means of which data information between the mobile communication terminal 1 and an identification device 3 can be exchanged over a wireless communication channel in the vicinity.
  • In Figure 1, reference numeral 7 refers to another communication terminal. This communication terminal 7 may be, for example, a landline telephone, a wire or wireless home telephone, an IP-capable telephone (for VoIP communication), or any other network terminal for transmitting voice and / or data information. In particular, this further communication terminal 7 may also be a mobile telephone, or else integrated into another customer premise equipment (CPE), for example as a so-called soft phone or a telephone application of a personal computer. The communication terminal 7 has one or more suitable interfaces in order to be able to establish a voice and / or data exchange via a communication channel 5. Finally, a communication between the mobile communication terminal 1 and the communication terminal 7 can be established via the communication network 4, for which purpose further devices, such as gateways and / or proxies, not shown in FIG. 1, may be required.
  • In Figure 1, the reference numeral 3 refers to an identification device, by means of which identity of a carrier 2 can be determined. This identification device 3 can be realized, in particular, as an RFID tag, but also any other device which can issue the identification data of a carrier 2 stored thereon on request. The RFID tag 3 typically comprises a memory module 32 for storing identification data, an integrated contactless interface 36, and a control module 31, by means of which the data exchange between the RFID tag 3 and an external interrogation device can be controlled via the interface 36. In particular, it is possible for communication and / or data exchange between the RFID tag 3 and the mobile communication terminal 1 to be established via the interface 36. The physical interface 36 of the RFID tag 3 and the corresponding physical interface 11 of the mobile communication terminal 1 thus support the common data transmission protocols for data transmission. It should be mentioned here that the data exchange of the RFID tag 3 by means of a single interface 36 or by means of more than one physical communication interface can be realized, for example by a communication interface only for the reception and a further communication interface are optimized only for the emission of the signals.
  • The RFID tag further comprises a measuring device or sensor 34 and / or analysis device 35. The measuring device or sensor 34 can detect body-specific data of the carrier 2 by a direct measurement. In particular, these measuring devices or sensors may be nanosensors. The body-specific data acquired by the measuring device or sensor 34 include, for example, the body temperature, the pH of the skin on certain body parts of the carrier 2, and the blood pressure or pulse values in certain situations. The analysis device 35 determines the body-specific data of the carrier 2 after a processing and analysis of the detected samples. The examples of data that can be determined by this analyzer 35 are DNA, blood, sweat and / or urine specific data. The measuring device or sensor 34 and / or the analysis device 35, however, can in principle detect any body-specific identification data or combinations thereof which enable a clear or partial identification of the carrier 2.
  • The RFID tag 3 may be worn either under or on the skin of the wearer 2. If the RFID tag 3 is worn under the skin of the wearer 2, it is placed under the skin by means of a suitable process, for example injected or otherwise implanted. This embodiment variant is particularly advantageous in view of the increased identification security and the greater comfort for the wearer 2. In particular, an under the skin set RFID tag 3 can not be lost or forgotten, and potential identity thieves can much more difficult to the valuable identification data of the carrier. 2 approach. In any case, the RFID tag 3 should be connected by means of a contact-type interface or directly to the body of the carrier 2, so that the measuring device or sensor 34 or the analysis device 35 can detect corresponding body-specific identification data of the carrier 2. In this case, the measuring device or sensor 34 can also be designed as a membrane or nanosensor.
  • The identity of the carrier 2 is confirmed by a verification module 33, based on the stored identification data, as well as carrier identification data, which are detected by means of the measuring device or sensor 34 and / or by means of the analysis device 35. In this case, the verification module 33 compares the transmitted detected body-specific identification data with the corresponding data of the carrier 2 stored in the memory module 32 of the RFID tag 3. The carrier 2 is identified by the verification module 33, for example, if the probability of a match of the transmitted body-specific data to certain stored body-specific data is above a predefinable threshold. In this way, different deployment situations of the identification system can be taken into account, depending on the required security level, data acquisition accuracy and identification precision of the respective body-specific data. In particular, the predefinable threshold value can also be selected equal to zero, which requires a one-to-one correspondence between the acquired and the stored identification data. The memory module 32 may be connected directly to the verification module 33 or exist as a separate module within the RFID tag 3. The verification module 33 in turn may be assigned to the RFID tag 3, but also separated from it and connected via a corresponding preferably contactless communication interface.
  • In an identification request by the mobile communication device 1, a corresponding request is transmitted to the control module 31 of the RFID tag 3 via the communication interfaces 13 and 36. The control module transmits this request to the measuring device or sensor 34 and / or analysis device 35, which detect the required body-specific identification data of the carrier 2. The detected body-specific identification data of the carrier 2 are transmitted to the verification module 33 and evaluated and / or checked by means of the verification module 33. For this purpose, the verification module 33 compares the detected body-specific identification data of the carrier 2 with the corresponding identification data stored in the memory module 32 of the RFID tag 3. Depending on the predefined threshold value, ie security policy and / or use of the system, the identity of the carrier 2 is confirmed or denied. After the confirmation the carrier identity, the required identification data are transmitted to the mobile communication device 1 via the communication interfaces 36 and 13 by means of the control module 31. So the identification can be compared with the identification by MAC address. Each RFID tag 3 receives a unique and unique number, whereby the carrier 2 of the RFID tag 3 is uniquely identifiable. This type of identification is particularly suitable for human-to-human IP communication.
  • In principle, data corresponding to multiple identities can be stored on the RFID tag 3. The use of different identities allows a finer and more accurate identification for different security applications and functions. Also, the use of different identities and the anonymity of the user can be ensured because in each identification process, a new stored identity can be used, for example, a pseudo-random generator, so that the abuses can be further limited and the identification of the carrier 2 with even greater reliability can be ensured.
  • In a further embodiment, the inventive identification method can be used in particular for the purpose of access to determinable premises and / or use of determinable devices, based on the identification and authorization of the carrier 2. Thus, otherwise very safety-critical systems can be easily and efficiently managed and controlled and the identity of the authorized persons are guaranteed.

Claims (26)

  1. Identification method by means of an RFID tag (3), wherein from a query device via a contactless interface (36) of the RFID tag (3) a request to a control module (31) of the RFID tag (30) is transmitted, wherein by means of the control module (31) access to identification data stored in a memory module (32) associated with the RFID tag (3) and wherein the identification data are transmitted via the contactless interface (36), characterized
    that by means of a measuring device or a sensor (34) assigned to the RFID tag (3) and / or by means of an analysis device (35), body-specific identification data of the carrier (2) are detected and transmitted to a verification module (33), and
    in that by means of the verification module (33) the transmitted body-specific identification data of the carrier (2) are compared with the identification data stored in the memory module (32) and the identity of the carrier (2) is confirmed by means of the verification module (33).
  2. A method according to claim 1, characterized in that the verification module (33) is associated with the RFID tag (3).
  3. A method according to claim 1 or 2, characterized in that the measuring device or sensor (34) and / or the analysis device (35) in the RFID tag (3) are integrated.
  4. Method according to one of claims 1 to 3, characterized in that the identity of the carrier (2) by means of the verification module (33) is confirmed if the probability of a match of the transmitted body-specific identification data to certain stored identification data is above a predefinable threshold.
  5. Method according to one of claims 1 to 4, characterized in that the identity of the carrier (2) by means of the verification module (33) is confirmed if the transmitted body-specific identification data with the specific stored identification data match one another.
  6. Method according to one of claims 1 to 5, characterized in that the RFID tag (3) under the skin of the carrier (2) is injected and / or set.
  7. Method according to one of claims 1 to 6, characterized in that the body-specific identification data include DNA and / or blood value-specific data.
  8. A method according to claim 7, characterized in that the body-specific identification data comprise a DNA signature and / or a hash of the DNA structure.
  9. Method according to one of claims 1 to 8, characterized in that via the contactless interface (36) transmitted identification data are encrypted by means of an encryption module.
  10. Method according to one of Claims 1 to 9, characterized in that the identification data transmitted via the contactless interface (36) comprise authentication data for authentication in a mobile radio network, in particular IMSI and / or MSISDN.
  11. Method according to one of claims 1 to 10, characterized in that the RFID tag (3) associated memory module (32) comprises multiple identities.
  12. System for user identification by means of an RFID tag (3), which RFID tag comprises a contactless interface (36) for transmitting requests from an interrogation device to a control module (31) of the RFID tag (30), by means of which control module (31) the identification data stored in a memory module (32) associated with the RFID tag (3) is accessible and wherein the identification data can be transmitted via the contactless interface (36), characterized in that
    that the system at least one RFID tag (3) associated with the measuring device or a sensor (34) and / or analysis device (35), by means of which body-specific identification data of the carrier (2) and transmitted to a verification module (33) are transferable, and
    in that the system comprises at least one verification module (33) for comparing the transmitted body-specific identification data of the carrier (2) with the identification data stored in the memory module (32), by means of which the identity of the carrier (2) can be confirmed.
  13. System according to claim 12, characterized in that the verification module (33) is associated with the RFID tag (3).
  14. System according to claim 12 or 13, characterized in that the measuring device or sensor (34) and / or the analysis device (35) in the RFID tag (3) are integrated.
  15. System according to one of claims 12 to 14, characterized in that the identity of the carrier (2) by means of the verification module (33) is confirmed if the probability of a match of the transmitted body-specific identification data to certain stored identification data is above a predefinable threshold.
  16. System according to one of claims 12 to 15, characterized in that the identity of the carrier (2) by means of the verification module (33) is confirmed if the transmitted body-specific identification data with the specific stored identification data match one another.
  17. System according to one of claims 12 to 16, characterized in that the RFID tag (3) under the skin of the carrier (2) are injected and / or set.
  18. System according to one of claims 12 to 17, characterized in that the body-specific identification data include DNA and / or blood value-specific data.
  19. System according to claim 18, characterized in that the body-specific identification data comprise a DNA signature and / or a hash of the DNA structure.
  20. System according to one of Claims 12 to 19, characterized in that the identification data transmitted via the contactless interface (36) can be encrypted by means of an encryption module.
  21. System according to one of Claims 12 to 20, characterized in that the identification data transmitted via the contactless interface (36) comprise authentication data for authentication in a mobile radio network, in particular IMSI and / or MSISDN.
  22. System according to one of claims 12 to 21, characterized in that the RFID tag (3) associated memory module (32) comprises multiple identities.
  23. An implantable and / or body contactable RFID tag (3) comprising a memory module (32) for storing data containing at least identification data of a carrier (2) and a control module (31) for controlling the data exchange via an RFID tag (3 ) integrated contactless interface (36), characterized
    that the RFID tag (3) comprises a measuring device or sensor (34) and / or analysis device (35) for detecting body-specific identification data of the carrier (2), and
    in that the RFID tag (3) comprises a verification module (33) for comparing recorded body-specific identification data of the carrier (2) with the stored identification data.
  24. RFID tag according to claim 23, characterized in that the body-specific identification data comprise DNA and / or blood value-specific data.
  25. RFID tag according to claim 23 or 24, characterized in that the body-specific identification data comprise a DNA signature and / or a hash of the DNA structure.
  26. RFID tag according to one of claims 23 to 25, characterized in that the data exchanged via the contactless interface (36) can be encrypted by means of an encryption module.
EP05100391A 2005-01-21 2005-01-21 Identification method and system and device therefor Ceased EP1684238A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP05100391A EP1684238A1 (en) 2005-01-21 2005-01-21 Identification method and system and device therefor

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
EP05100391A EP1684238A1 (en) 2005-01-21 2005-01-21 Identification method and system and device therefor
JP2007551672A JP5425401B2 (en) 2005-01-21 2006-01-19 Identification method and system, and device suitable for said method and system
US11/814,424 US7750810B2 (en) 2005-01-21 2006-01-19 Identification method and system and device suitable for said method and system
PCT/EP2006/050310 WO2006077234A1 (en) 2005-01-21 2006-01-19 Identification method and system and device suitable for said method and system
BRPI0607276 BRPI0607276A2 (en) 2005-01-21 2006-01-19 methods and identification system and suitable device for the same
CN 200680002839 CN101107633A (en) 2005-01-21 2006-01-19 Identification method and system and device therefor

Publications (1)

Publication Number Publication Date
EP1684238A1 true EP1684238A1 (en) 2006-07-26

Family

ID=34938547

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05100391A Ceased EP1684238A1 (en) 2005-01-21 2005-01-21 Identification method and system and device therefor

Country Status (6)

Country Link
US (1) US7750810B2 (en)
EP (1) EP1684238A1 (en)
JP (1) JP5425401B2 (en)
CN (1) CN101107633A (en)
BR (1) BRPI0607276A2 (en)
WO (1) WO2006077234A1 (en)

Families Citing this family (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7198603B2 (en) * 2003-04-14 2007-04-03 Remon Medical Technologies, Inc. Apparatus and methods using acoustic telemetry for intrabody communications
US8099080B1 (en) * 2006-02-17 2012-01-17 Securus Technologies, Inc. Wireless communications control in a controlled environment facility
US8019354B2 (en) * 2006-02-17 2011-09-13 Securus Technologies, Inc. Wireless communications control in a controlled environment facility
US20070218837A1 (en) * 2006-03-14 2007-09-20 Sony Ericsson Mobile Communications Ab Data communication in an electronic device
US7908334B2 (en) * 2006-07-21 2011-03-15 Cardiac Pacemakers, Inc. System and method for addressing implantable devices
US7741970B2 (en) 2006-12-31 2010-06-22 At&T Intellectual Property Ii, L.P. Method and apparatus for a radio frequency identification repeater
DE102007022355A1 (en) 2007-05-12 2008-11-13 Schaeffler Kg Measuring point identification for automatic measuring point detection in a condition monitoring system
DE102007062843A1 (en) * 2007-12-21 2009-06-25 Amedo Smart Tracking Solutions Gmbh Method for detecting movement
US8041431B2 (en) * 2008-01-07 2011-10-18 Cardiac Pacemakers, Inc. System and method for in situ trimming of oscillators in a pair of implantable medical devices
US8301262B2 (en) 2008-02-06 2012-10-30 Cardiac Pacemakers, Inc. Direct inductive/acoustic converter for implantable medical device
WO2010019326A1 (en) 2008-08-14 2010-02-18 Cardiac Pacemakers, Inc. Performance assessment and adaptation of an acoustic communication link
JP5332600B2 (en) * 2008-12-25 2013-11-06 ソニー株式会社 Information processing apparatus, communication control method, program, and information processing system
US8660488B2 (en) 2009-01-30 2014-02-25 Kabushiki Kaisha Toshiba Communication device
US8732468B2 (en) * 2009-03-09 2014-05-20 The Regents Of The University Of Michigan Protecting hardware circuit design by secret sharing
US20110068892A1 (en) * 2009-09-20 2011-03-24 Awarepoint Corporation Wireless Tracking System And Method Utilizing Near-Field Communication Devices
CN102103765A (en) * 2009-12-16 2011-06-22 中兴通讯股份有限公司 Access control and information display system, method and terminal
WO2011130158A1 (en) * 2010-04-16 2011-10-20 Gojo Industries, Inc. Taggant keying system for dispensing systems
US8640212B2 (en) 2010-05-27 2014-01-28 Red Hat, Inc. Securing passwords with CAPTCHA based hash when used over the web
US8718546B2 (en) * 2010-08-16 2014-05-06 Blackberry Limited Near-field communication (NFC) system providing low power peer-to-peer recognition mode and related methods
US8712724B2 (en) 2010-09-30 2014-04-29 Fitbit, Inc. Calendar integration methods and systems for presentation of events having combined activity and location information
US8954290B2 (en) 2010-09-30 2015-02-10 Fitbit, Inc. Motion-activated display of messages on an activity monitoring device
US9031812B2 (en) 2014-02-27 2015-05-12 Fitbit, Inc. Notifications on a user device based on activity detected by an activity monitoring device
US8805646B2 (en) 2010-09-30 2014-08-12 Fitbit, Inc. Methods, systems and devices for linking user devices to activity tracking devices
US8620617B2 (en) 2010-09-30 2013-12-31 Fitbit, Inc. Methods and systems for interactive goal setting and recommender using events having combined activity and location information
US8615377B1 (en) 2010-09-30 2013-12-24 Fitbit, Inc. Methods and systems for processing social interactive data and sharing of tracked activity associated with locations
US9241635B2 (en) 2010-09-30 2016-01-26 Fitbit, Inc. Portable monitoring devices for processing applications and processing analysis of physiological conditions of a user associated with the portable monitoring device
US10004406B2 (en) 2010-09-30 2018-06-26 Fitbit, Inc. Portable monitoring devices for processing applications and processing analysis of physiological conditions of a user associated with the portable monitoring device
US9148483B1 (en) 2010-09-30 2015-09-29 Fitbit, Inc. Tracking user physical activity with multiple devices
US9728059B2 (en) 2013-01-15 2017-08-08 Fitbit, Inc. Sedentary period detection utilizing a wearable electronic device
US8954291B2 (en) 2010-09-30 2015-02-10 Fitbit, Inc. Alarm setting and interfacing with gesture contact interfacing controls
US8738321B2 (en) 2010-09-30 2014-05-27 Fitbit, Inc. Methods and systems for classification of geographic locations for tracked activity
US8694282B2 (en) 2010-09-30 2014-04-08 Fitbit, Inc. Methods and systems for geo-location optimized tracking and updating for events having combined activity and location information
US8744803B2 (en) 2010-09-30 2014-06-03 Fitbit, Inc. Methods, systems and devices for activity tracking device data synchronization with computing devices
US9310909B2 (en) 2010-09-30 2016-04-12 Fitbit, Inc. Methods, systems and devices for physical contact activated display and navigation
US8738323B2 (en) 2010-09-30 2014-05-27 Fitbit, Inc. Methods and systems for metrics analysis and interactive rendering, including events having combined activity and location information
US9390427B2 (en) 2010-09-30 2016-07-12 Fitbit, Inc. Methods, systems and devices for automatic linking of activity tracking devices to user devices
US8762102B2 (en) 2010-09-30 2014-06-24 Fitbit, Inc. Methods and systems for generation and rendering interactive events having combined activity and location information
US8762101B2 (en) 2010-09-30 2014-06-24 Fitbit, Inc. Methods and systems for identification of event data having combined activity and location information of portable monitoring devices
EP2621565B1 (en) * 2010-10-07 2018-07-11 Massachusetts Institute of Technology Delivery of a solid body and/or a fluid using a linear lorentz-force actuated needle-free jet injection system
US9042281B2 (en) * 2010-12-08 2015-05-26 At&T Intellectual Property I, L.P. Method and apparatus for initializing an RFID tag via an optical display
RU2510076C2 (en) * 2010-12-27 2014-03-20 Немчик Александр Ювентинович Telephone scanner: mobile device for real time identification of personal identification implant code (chip code)
RU2506639C2 (en) * 2010-12-27 2014-02-10 Немчик Александр Ювентинович Method for real-time, mobile identification of implanted personal identification implant code (chip code)
US8823513B2 (en) * 2011-01-18 2014-09-02 Radio Systems Corporation Systems and methods to track movement of animals
US20130012795A1 (en) * 2011-07-05 2013-01-10 Collar Id Llc Apparatus and methods for sensing a parameter with a restraint device
US20130009756A1 (en) * 2011-07-07 2013-01-10 Nokia Corporation Verification using near field communications
US9858583B2 (en) 2011-09-01 2018-01-02 Avery Dennison Retail Information Services, Llc Apparatus, system and method for tracking consumer product interest using mobile devices
US8630908B2 (en) 2011-11-02 2014-01-14 Avery Dennison Corporation Distributed point of sale, electronic article surveillance, and product information system, apparatus and method
US10154651B2 (en) 2011-12-05 2018-12-18 Radio Systems Corporation Integrated dog tracking and stimulus delivery system
CN103164794A (en) * 2011-12-16 2013-06-19 中国电信股份有限公司 Transaction processing chip card, movable terminals and payment method
US20130198056A1 (en) * 2012-01-27 2013-08-01 Verizon Patent And Licensing Inc. Near field communication transaction management and application systems and methods
US8947239B1 (en) 2012-03-05 2015-02-03 Fitbit, Inc. Near field communication system, and method of operating same
US8976022B2 (en) 2012-04-13 2015-03-10 Khalid Hamad Motleb ALNAFISAH Mobile tracking identification system, method, and computer program product
KR20130116602A (en) * 2012-04-16 2013-10-24 삼성전자주식회사 Method for controlling card emulation mode and an electronic device thereof
US9253168B2 (en) * 2012-04-26 2016-02-02 Fitbit, Inc. Secure pairing of devices via pairing facilitator-intermediary device
EP2771845B1 (en) 2012-09-10 2019-01-02 Avery Dennison Corporation Method for preventing unauthorized diversion of nfc tags
FR2997528A1 (en) * 2012-10-26 2014-05-02 Oberthur Technologies Biometric identification
EP3429250A1 (en) 2012-11-19 2019-01-16 Avery Dennison Corporation Nfc security system and method for disabling unauthorized tags
US20140152421A1 (en) * 2012-12-04 2014-06-05 Cellco Partnership D/B/A Verizon Wireless Near field communication based key control service
US20140159873A1 (en) * 2012-12-12 2014-06-12 Joshua J. Ratcliff Systems and methods for using a rfid tag to initiate voice communications between an automobile and a building of a business
US8738925B1 (en) 2013-01-07 2014-05-27 Fitbit, Inc. Wireless portable biometric device syncing
US10228447B2 (en) 2013-03-15 2019-03-12 Radio Systems Corporation Integrated apparatus and method to combine a wireless fence collar with GPS tracking capability
US20140273824A1 (en) * 2013-03-15 2014-09-18 Medtronic, Inc. Systems, apparatus and methods facilitating secure pairing of an implantable device with a remote device using near field communication
US9446471B2 (en) * 2013-03-15 2016-09-20 Lincoln Global, Inc. Systems and methods for communicating with welding equipment
US20140298195A1 (en) * 2013-04-01 2014-10-02 Harman International Industries, Incorporated Presence-aware information system
US20140340217A1 (en) * 2013-05-15 2014-11-20 Collar ID, LLC Apparatus and methods for sensing a parameter with a restraint device
US20150223057A1 (en) * 2014-01-31 2015-08-06 Quick Release Lifescan, LLC System and method for communicating protected health information
US9288298B2 (en) 2014-05-06 2016-03-15 Fitbit, Inc. Notifications regarding interesting or unusual activity detected from an activity monitoring device
US20150288687A1 (en) * 2014-04-07 2015-10-08 InvenSense, Incorporated Systems and methods for sensor based authentication in wearable devices
US9514338B1 (en) 2014-04-15 2016-12-06 Anne Bromberg Implantable identification apparatus and related methods of use
CN104656611A (en) * 2014-12-27 2015-05-27 中航电测仪器股份有限公司 Loading condition monitoring system for residue soil truck
EP3198581A4 (en) * 2015-03-31 2017-08-23 SZ DJI Technology Co., Ltd. Systems and methods for uav mutual authentication
US10045512B2 (en) 2015-06-16 2018-08-14 Radio Systems Corporation Systems and methods for monitoring a subject in a premise
US10231440B2 (en) 2015-06-16 2019-03-19 Radio Systems Corporation RF beacon proximity determination enhancement
US10080530B2 (en) 2016-02-19 2018-09-25 Fitbit, Inc. Periodic inactivity alerts and achievement messages
CN106327651A (en) * 2016-09-13 2017-01-11 成都创慧科达科技有限公司 Intelligent safe door lock

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5499626A (en) * 1992-05-01 1996-03-19 Willham; Richard L. Individual descriptive record system
DE19607222A1 (en) * 1996-02-11 1997-08-14 Michael R Dipl Phys Bedrich Implantable chip for medical bio-potential storage and percutaneous read-out
EP0990756A2 (en) * 1998-09-28 2000-04-05 Anatoli Stobbe Access control system
WO2001054074A1 (en) * 2000-01-19 2001-07-26 Skidata Ag Authorization control device
US20030173408A1 (en) 2002-03-18 2003-09-18 Precision Dynamics Corporation Enhanced identification appliance
EP1387323A1 (en) * 2002-07-30 2004-02-04 Omega Electronics S.A. Authentication by biometric sensing of the carrier of an identification device and/or portable identification access system and/or electronic access

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6208115B1 (en) * 1997-06-16 2001-03-27 Yehuda Binder Battery substitute pack
FR2788914B1 (en) * 1999-01-22 2001-03-23 Sfr Sa Method for authentication, with establishment of a secure channel between a subscriber and a service provider accessible via an operator of telecommunication
JP2002117378A (en) * 2000-10-05 2002-04-19 Dainippon Printing Co Ltd Noncontact ic card system
JP2002248081A (en) * 2001-02-26 2002-09-03 Olympus Optical Co Ltd Medical equipment
GB2386885A (en) * 2002-03-27 2003-10-01 John Mckay Low Micro chip indicating person's identity
JP2004013831A (en) * 2002-06-11 2004-01-15 Canon Inc Personal authentication system, device and method
WO2004084720A2 (en) * 2003-03-21 2004-10-07 Welch Allyn, Inc. Personal status physiologic monitor system and architecture and related monitoring methods

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5499626A (en) * 1992-05-01 1996-03-19 Willham; Richard L. Individual descriptive record system
DE19607222A1 (en) * 1996-02-11 1997-08-14 Michael R Dipl Phys Bedrich Implantable chip for medical bio-potential storage and percutaneous read-out
EP0990756A2 (en) * 1998-09-28 2000-04-05 Anatoli Stobbe Access control system
WO2001054074A1 (en) * 2000-01-19 2001-07-26 Skidata Ag Authorization control device
US20030173408A1 (en) 2002-03-18 2003-09-18 Precision Dynamics Corporation Enhanced identification appliance
EP1387323A1 (en) * 2002-07-30 2004-02-04 Omega Electronics S.A. Authentication by biometric sensing of the carrier of an identification device and/or portable identification access system and/or electronic access

Also Published As

Publication number Publication date
BRPI0607276A2 (en) 2009-08-25
US7750810B2 (en) 2010-07-06
JP5425401B2 (en) 2014-02-26
WO2006077234A1 (en) 2006-07-27
US20080129457A1 (en) 2008-06-05
CN101107633A (en) 2008-01-16
JP2008532105A (en) 2008-08-14

Similar Documents

Publication Publication Date Title
Madlmayr et al. NFC devices: Security and privacy
US7139914B2 (en) System and method for network security
EP2081135B2 (en) Contactless data carrier
US7360248B1 (en) Methods and apparatus for verifying the identity of a user requesting access using location information
US7172115B2 (en) Biometric identification system
EP0924657B2 (en) Remote idendity verification technique using a personal identification device
EP2153382B1 (en) Dynamically programmable rfid transponder
US8561168B2 (en) Access point, terminal, encryption key configuration system, encryption key configuration method, and program
US8232862B2 (en) Biometrically authenticated portable access device
EP2102778B1 (en) Method and arrangement for secure user authentication based on a biometric data detection device
US7471199B2 (en) Mobile key using read/write RFID tag
US6850147B2 (en) Personal biometric key
US20070194882A1 (en) Authentication system and authentication apparatus
JP4922288B2 (en) Biometric device with smart card function
JP2011530752A (en) Integrated circuit operation control method incorporating direction sensing mechanism, direction sensing mechanism, communication device equipped with integrated circuit, and micro electromechanical device
US20160148193A1 (en) Secure credit card with near field communications
US8730009B2 (en) Smart card and mobile communication device comprising the smart card
US20070040017A1 (en) Wireless biometric cardholder apparatus, method, & system
KR101202580B1 (en) A system for identifying an individual in an electronic transaction
USH2120H1 (en) Biometric personal identification credential system (PICS)
US9529991B2 (en) Systems and methods for multi-factor remote user authentication
US7921297B2 (en) Random biometric authentication utilizing unique biometric signatures
US20040205350A1 (en) Low cost secure ID card and system
AU2006203515B2 (en) Protection of Non-Promiscuous Data in an RFID Transponder
CN102918550B (en) Double response device RF identification

Legal Events

Date Code Title Description
AX Request for extension of the european patent to

Countries concerned: ALBAHRLVMKYU

AK Designated contracting states:

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

17P Request for examination filed

Effective date: 20060923

AKX Payment of designation fees

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

RAP1 Transfer of rights of an ep published application

Owner name: SWISSCOM AG

17Q First examination report

Effective date: 20120612

18R Refused

Effective date: 20151017