GB2384648A - Tagging system - Google Patents

Tagging system Download PDF

Info

Publication number
GB2384648A
GB2384648A GB0201756A GB0201756A GB2384648A GB 2384648 A GB2384648 A GB 2384648A GB 0201756 A GB0201756 A GB 0201756A GB 0201756 A GB0201756 A GB 0201756A GB 2384648 A GB2384648 A GB 2384648A
Authority
GB
United Kingdom
Prior art keywords
tag
article
less
response
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0201756A
Other versions
GB0201756D0 (en
GB2384648B (en
Inventor
Anthony Furness
Timothy Glyn Hankins
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intellident Ltd
Original Assignee
Intellident Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intellident Ltd filed Critical Intellident Ltd
Priority to GB0201756A priority Critical patent/GB2384648B/en
Publication of GB0201756D0 publication Critical patent/GB0201756D0/en
Priority to PCT/GB2003/000292 priority patent/WO2003063061A1/en
Publication of GB2384648A publication Critical patent/GB2384648A/en
Application granted granted Critical
Publication of GB2384648B publication Critical patent/GB2384648B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/74Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
    • G01S13/75Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems using transponders powered from received waves, e.g. using passive transponders, or using passive reflectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer

Landscapes

  • Engineering & Computer Science (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Burglar Alarm Systems (AREA)
  • Near-Field Transmission Systems (AREA)

Abstract

A tagging system and method includes at least one tag, preferably a plurality of tags, designed to provide a response signal upon receiving one or more identification codes associated with the tag and having a response range of less than 2 metres, or more preferably, 1 or 0.5 metres. The tag is preferably located on or in an article, and the range be less or substantially less than the size of the article. There may be a refractory period after the tag receives an incorrect identification code.

Description

<Desc/Clms Page number 1>
TAGGING SYSTEM The present invention relates to a tagging system.
Radio frequency identification (RFID) data carrier devices (tags or transponders) are now being applied for security oriented applications such as property crime reduction and in combating supply chain shrinkage. Such developments are also being promoted by initiatives such as the Home Office Chipping of Goods Initiative. Typically, the tags carry identification codes that can be accessed without contact by radio frequency interrogation means. Unfortunately, conventional RFID data carriers are easy targets for a would-be criminal adversary intent on defeating or removing the means of identification. While tamper-evident tags are available and the embedding of tags can be seen to provide further levels of deterrence the act of interrogating a tag reveals its presence once the reader field is sufficiently within its vicinity.
The present invention seeks to provide an improved tagging system.
According to an aspect of the present invention, there is provided a tagging system including at least one tag designed to provide a response signal solely upon receipt of one or more identification codes associated with said tag and wherein the tag has a response range of less than two metres. Preferably, the response range is less than one metre and most preferably less than 0.5 metres.
According to another aspect of the present invention, there is provided a tagging system for use in identifying an article in which a tag is placed on or incorporated in the article, wherein the tag is designed to provide a response signal solely in response to one or more tag identification codes associated with the tag and wherein the response range of the tag is less than the size of the article.
According to another aspect of the present invention, there is provided a method of tagging an article including the step of providing a tag which is responsive only to one or more tag identification codes associated with the tag and which has a response range less than the size of the article; and locating said tag on or in the article.
Advantageously, the response range of the tag is substantially less than the size of the article, for example at least an order of magnitude less than the size of the article.
With the present invention, it is possible to provide a tagged article in which the presence of the tag and its identification can only be determined if the identification code of the tag is known as well as its location on the article. The system, therefore, can provide a secure method of identifying an article and in which, unless the identification of the tag
<Desc/Clms Page number 2>
and its location are known, a third party may not detect the existence of the tag and therefore not have the ability to tamper with or remove the tag.
In the preferred embodiment, the tag is designed with a refractory period following the receipt of an incorrect code, in which the tag is set in an unresponsive state so as not to respond during said period even upon receipt of the correct identification code. This feature can substantially reduce the risk of the tag being betrayed by code scanning devices.
Advantageously, there may be provided a plurality of tags on or in any one article so that if one tag is located by an unauthorised person, there would still be at least one other tag hidden on or in the article for identification the article.
A tag can be configured to respond to more than one identification code, for example for different levels of authorisation, and may alternatively or additionally be configured to emit a different response code upon the receipt of an authorised identification code.
Embodiments of the present invention are described below, by way of example only, with reference to the accompanying drawing, in which the sole Figure is a schematic diagram of the main functioning elements of a preferred embodiment of tagging system.
The embodiment shown in the Figure provides a tagging system in which one or more tags are incorporated on or into an article to be protected such that the tag is not externally visible when looking at the article. The tag is of a type which requires the input of a specific identification code into the tag before the tag emits any response signal. Input is typically on the basis of a wireless communications link (for example radio frequency) with signals being sent from an interrogator.
Upon receiving the correct identification code, the tag responds to inform the interrogator of its presence. The response may be by the generation and transmission of a coded return signal, which may be same as the received code or a different code. As the tag will be specific to the article in which it is incorporated, identification of the tag will identify the article.
The tag has a short response range such that the interrogator must be placed close to the tag for the tag to respond. This may, for example, be a distance of two metres or less, although preferably the distance is one metre or less, most preferably 0.5 metres or less. Advantageously, the response distance of the tag is chosen so as to be substantially
<Desc/Clms Page number 3>
less than the size of the article in which the tag is located. This difference may be, for example, an order of magnitude less than the size of the article.
Thus, a person or device operating an interrogator must know the location of the tag to place the interrogator close enough to the tag to prompt a response. For example, if the tag is incorporated within the structure of a boat, the interrogator must be placed at a location on the boat which is very close to the tag to cause the tag to respond.
An embodiment of structure of tagging system is shown in the Figure. Referring to this Figure, the embodiment of interrogator 10 shown has a facility to generate a radio frequency carrier field which carries as a modulated signal a user or automatically selected tag identification code. The interrogator 10 also includes a receiver section for detecting a coded response generated by the tag.
The interrogator 10 is able to generate or receive by way of a user input any one of a plurality, preferably a very large number, of possible tag identification codes for transmission in the carrier field.
The tag 20 is provided with a plurality of circuit units. The first is a field detection reset unit 22 designed to receive the code modulated signals from the interrogator. This unit 22 is coupled to an energy storage/rectification unit 24 and a synchronisation and a control unit 26, the structures of which will be apparent to the skilled person.
The field detection and reset unit 22 is designed to feed the received code to a code detection and extraction unit 28 which is operable to extract the code from the received carrier signal. The extracted code is then held in a holding register 30 for later comparison.
A code comparator 32 is coupled to receive the code held in the holding register 30 and designed to compare it with the tag's identification code held in another register 34.
The code comparator 32, that is the negative (no match) output thereof, is coupled to a trigger unit 36 which is operable to trigger a refractory period generator 38 upon the code comparator 32 issuing a no match output occurring when the received code held in the holding register 30 does not match the tag's own identification code. The refractory period inhibits functioning of the comparator 32 and may be a pre-set number of clock cycles or of variable duration.
The positive (match) output of the code comparator 32, that is the output indicative of a match between the received code and the tag's own identification code, is coupled to a response trigger 40 operable to generate a response code which is then modulated by
<Desc/Clms Page number 4>
modulator unit 42 to create a code modulated return signal transmitted to the interrogator 10.
As explained above, the tag 20 is designed to have a short response range which may be two metres or less and is preferably less than 0.5 metres. Thus, the interrogator 10 must be placed close to the tag 20 for the tag to operate.
The tag 20 is designed to remain"quiet", that is"unresponsive"to anything other than the correctly coded modulated signal. It is also of a type which can be embedded or otherwise hidden within an item to be tagged.
Thus, in the presence of an interrogation field other than one containing the correct code of that tag, whether or not that interrogation field is coded or not, the tag remains silent and therefore does not betray its presence of the user or the interrogator. Thus, someone wishing to get a tag to respond and identify itself must know not only the identification code of the tag but also the tag's approximate location, in other words its approximate location within the article in which it is kept. This information can be provided in the form of a"passport"to the legitimate user or owner of the article.
The presence of the refractory period within the mechanism of the tag 20 is intended to deter the use of scanning techniques in which the coded field is sequentially changed in an attempt to find the valid code for that tag. Of course, the longer the period of inactivity set by the refractory timer, the lower is the risk of such a scanning technique identifying the correct code.
It is envisaged that for articles of a relatively large size or of high value a plurality tags could be incorporated into the device. The tags could be close to one another, in which case a user would need to be aware of the refractory period to generate the two or more codes with a suitable time gap between them to overcome the period of inactivity of the"second"tag to be interrogated. Alternatively, the tags can be placed sufficiently distant from one another that their interrogations are completely separate and do not generate a refractory period in the second tag to be interrogated.
It will be apparent that the response range for a tag need not be fixed but can be set in dependence upon the size of the article in which the tag is located. In this regard, in order to increase security, the response range of the tag is preferably smaller than the size of the article such that the user of an interrogator needs to do more than just place the interrogator close to the tag, that is he must know the location of the tag in order to be able
<Desc/Clms Page number 5>
to place the interrogator close enough to generate a response from the tag. The system thus enables a person to authenticate the identity of the article and therefore the ownership thereof. This can be achieved in a manner in which a third party cannot simply swap tags for the reason of not knowing if any tags are fitted to the article, where they are located in the article and how many there may be. Security could be improved by incorporating one or more decoy devices in addition to readable tags.
The no-match response and the comparator 32 which is used to trigger a variable refractory period (that is a non-functional period over a variable of n cycles) to tag comparator may be synchronised to the pulse repetition frequency in the interrogation signal and based on random number generation. This may be a combination with a single or multiple match strategy for generating a valid response.
In some embodiments, additional features may be incorporated to enhance security against incidental or adversary scan attempts to detect the tag. These include, for example, the requirements of a correct code to be delivered several times within a particular time period in order to effect a response and for longer refractory periods to be introduced the more incorrect codes are presented. A full power down for a period of time could, for example, be required under such conditions in order to achieve a reset to the tag's original state.

Claims (8)

1. A tagging system including at least one tag designed to provide a response signal solely upon receipt of one or more identification codes associated with said tag and wherein the tag has a response range of less than two metres.
2. A system according to claim 1, wherein the response range of the tag is less than one metre.
3. A system according to claim 1, wherein the response range of the tag is less than 0.5 metres.
4. A tagging system for use in identifying an article in which a tag is placed on or incorporated in the article, wherein the tag is designed to provide a response signal solely in response to one or more tag identification codes associated with the tag and wherein the response range of the tag is less than the size of the article.
5. A method of tagging an article including the step of providing a tag which is responsive only to one or more tag identification codes associated with the tag and which has a response range less than the size of the article; and locating said tag on or in the article.
6. A system or method according to any preceding claim, wherein the response range of the tag is substantially less than the size of the article.
7. A system or method according to any preceding claim, wherein the tag is designed with a refractory period following the receipt of an incorrect code.
8. A system or method according to any preceding claim, wherein the tag is configured to respond to more than one identification code.
8. A system or method according to any preceding claim, wherein there is provided a plurality of tags.
<Desc/Clms Page number 7>
GB0201756A 2002-01-25 2002-01-25 Tagging system Expired - Fee Related GB2384648B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB0201756A GB2384648B (en) 2002-01-25 2002-01-25 Tagging system
PCT/GB2003/000292 WO2003063061A1 (en) 2002-01-25 2003-01-23 Tagging system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0201756A GB2384648B (en) 2002-01-25 2002-01-25 Tagging system

Publications (3)

Publication Number Publication Date
GB0201756D0 GB0201756D0 (en) 2002-03-13
GB2384648A true GB2384648A (en) 2003-07-30
GB2384648B GB2384648B (en) 2007-01-10

Family

ID=9929763

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0201756A Expired - Fee Related GB2384648B (en) 2002-01-25 2002-01-25 Tagging system

Country Status (2)

Country Link
GB (1) GB2384648B (en)
WO (1) WO2003063061A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2437347A (en) * 2006-04-22 2007-10-24 Humberto Moran Privacy-friendly RFID system prevents unauthorised interrogation of RFID tags

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2157112A (en) * 1983-09-30 1985-10-16 Findit As A method and a transponder for measuring a distance and identification
GB2283600A (en) * 1993-11-02 1995-05-10 Nippon Denso Co Communication system
EP0775918A2 (en) * 1995-11-22 1997-05-28 Kabushiki Kaisha Tokai-Rika-Denki-Seisakusho Transmission-reception system
GB2308527A (en) * 1995-12-19 1997-06-25 Robert James Brown Vehicle borne transponder device
GB2309132A (en) * 1996-01-11 1997-07-16 Hugh Malcolm Ian Bell Object location system
EP0935211A2 (en) * 1998-01-19 1999-08-11 Zebra Technologies Corporation Electronic indentification system with forward error correction system
US20010013830A1 (en) * 1998-08-14 2001-08-16 3M Innovative Properties Company Applications for radio frequency identification systems
EP1147953A2 (en) * 2000-04-19 2001-10-24 Texas Instruments Deutschland Gmbh Security system to prevent unauthorised starting of the engine of a vehicle

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9313332D0 (en) * 1993-06-28 1993-08-11 Baldwin Robert J Security/access system
US5430447A (en) * 1993-08-23 1995-07-04 Texas Instruments Deutschland Gmbh Protection against manipulation of batteryless read/write transponders
US5689238A (en) * 1996-03-08 1997-11-18 Lucent Technologies, Inc. Object locator system and methods therefor
EP1087332B1 (en) * 1999-09-22 2008-02-13 EM Microelectronic-Marin SA Transponder constructed for several different applications

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2157112A (en) * 1983-09-30 1985-10-16 Findit As A method and a transponder for measuring a distance and identification
GB2283600A (en) * 1993-11-02 1995-05-10 Nippon Denso Co Communication system
EP0775918A2 (en) * 1995-11-22 1997-05-28 Kabushiki Kaisha Tokai-Rika-Denki-Seisakusho Transmission-reception system
GB2308527A (en) * 1995-12-19 1997-06-25 Robert James Brown Vehicle borne transponder device
GB2309132A (en) * 1996-01-11 1997-07-16 Hugh Malcolm Ian Bell Object location system
EP0935211A2 (en) * 1998-01-19 1999-08-11 Zebra Technologies Corporation Electronic indentification system with forward error correction system
US20010013830A1 (en) * 1998-08-14 2001-08-16 3M Innovative Properties Company Applications for radio frequency identification systems
EP1147953A2 (en) * 2000-04-19 2001-10-24 Texas Instruments Deutschland Gmbh Security system to prevent unauthorised starting of the engine of a vehicle

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2437347A (en) * 2006-04-22 2007-10-24 Humberto Moran Privacy-friendly RFID system prevents unauthorised interrogation of RFID tags
GB2437347B (en) * 2006-04-22 2008-04-02 Humberto Moran Object tracking
EP2024898B1 (en) * 2006-04-22 2011-01-05 Friendly Technologies Ltd Object tracking

Also Published As

Publication number Publication date
WO2003063061A1 (en) 2003-07-31
GB0201756D0 (en) 2002-03-13
GB2384648B (en) 2007-01-10

Similar Documents

Publication Publication Date Title
US11126803B2 (en) Method, system and apparatus for NFC security
CN102246187B (en) Method and system for item level uhf rfid tag with low frequency power assist
EP1382009B1 (en) System and method for controlling remote devices
US5099226A (en) Intelligent security system
Rieback et al. The evolution of RFID security
US6549119B1 (en) Electronic identification system
US20070040683A1 (en) Light-activated RFID tag
US7755485B2 (en) System and method for electronic article surveillance
CN101346728B (en) Collaborating RFID devices
US20070018828A1 (en) System and method for disabling data on radio frequency identification tags
BRPI0710622A2 (en) rfid mutual authentication verification session
JP2002525640A (en) RFID detection system
EP2149851A1 (en) Radio frequency data reader
WO2001045063A1 (en) Tag
Liu et al. Study on the anti-theft technology of museum cultural relics based on Internet of Things
CA2490510A1 (en) Multiple rfid anti-collision interrogation method
US6639513B2 (en) Anti-pilferage system
US20080204237A1 (en) RFID tag with security features
USH1606H (en) Electronic quasi-passive identification system
GB2384648A (en) Tagging system
WO2006000978A3 (en) Method, reader and system for finding objects
GB2387744A (en) Transponder alarm system
Johansson An Introduction to RFID–Information Security and Privacy Concerns
CN203038348U (en) Electronic lock with light sensing function
CN103310565A (en) RFID (radio frequency identification) based around-the-clock intelligent anti-theft building access control warning system

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)
ERR Erratum

Free format text: PATENT APPLICATION GB0201756.4 GB2384648 WAS ERRONEOUSLY ANNOUNCED AS TERMINATED (AFTER PUBLICATION) IN THE PDJ DATED 20060512

PCNP Patent ceased through non-payment of renewal fee

Effective date: 20180125