TW393630B - Protocol for storage and retrieval of data in an RFID tag which uses objects - Google Patents

Protocol for storage and retrieval of data in an RFID tag which uses objects Download PDF

Info

Publication number
TW393630B
TW393630B TW087111348A TW87111348A TW393630B TW 393630 B TW393630 B TW 393630B TW 087111348 A TW087111348 A TW 087111348A TW 87111348 A TW87111348 A TW 87111348A TW 393630 B TW393630 B TW 393630B
Authority
TW
Taiwan
Prior art keywords
information
memory
item
security
size
Prior art date
Application number
TW087111348A
Other languages
Chinese (zh)
Inventor
John H Bowers
Original Assignee
Checkpoint Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Checkpoint Systems Inc filed Critical Checkpoint Systems Inc
Application granted granted Critical
Publication of TW393630B publication Critical patent/TW393630B/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/246Check out systems combined with EAS, e.g. price information stored on EAS tag
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2448Tag with at least dual detection means, e.g. combined inductive and ferromagnetic tags, dual frequencies within a single technology, tampering detection or signalling means on the tag

Abstract

An RFID tag stores and retrieves data using objects. Each object includes an information field containing intelligence information regarding an item, an identifier code representing the type of intelligence information in the information field, and a size field representing the size of the intelligence information in the information field. An RFID system interrogates an RFID tag by requesting an identifier code is present in the RFID tag, the tag transmits the information field and size field of the object, or the entire object. Plural objects may be stored on a single RFID tag. The objects are stored in the RFID tag in any desired manner. The same RFID system may use RFID tags with different memory management schemes for storing and retrieving objects.

Description

經濟部中央標準局貝工消費合作社印製 Λ7 —__ B7 五、發明説明(1 ) , 本發明之背景 一些可用以偵測並防止自零售業所及/或其他類似圊 書館等之設施,竊取或擅自取走物品或貨品之電子物件監 視(EAS)系統’已變得十分普及。通常,此種保安系統係 採矿一種保安標籤,其係固定在一物品(或其包裝)上面, 或與其相聯結’該物品通常係可供潛在顧客或設施使用者 隨意接近,故極易被擅自取走。通常,此種EAS系統係用 來摘測一受監視保安區域或偵測區域内,一保安標籤和因 而一受保護物品之存在(或不存在)與否。在大部份之情況 中’上述偵測區域係位於該設施之出口或入口,或一部份 設施之四周。 • 一類廣為流傳之EAS系統,係利用一種保安標籤,其 包含一自有的、小型的、通常呈平面狀之印刷電路,其可 在一偵測頻率範圍内,共振於一預定之偵測頻率下。一亦 調制在該偵測頻率下之發送器,係用來將電磁能或一詢問 訊號’發送至上述之偵測區域内。一調制在該偵測頻率下 之接收器,係位於上述偵測區域之附·近。通常,該發送器 和一發送器天線,係位於一出口或走道之一側,以及該接 f器和一接收器天線,係位於該出口或走道之另一側,而 使一要離開該設施之人,必要穿過該等發送器與接收器之 天線間。當一具有貼附保安標蕺之物品,進入或穿過該偵 測區域時,該保安標籤便會曝露在上述所發送之能量下(該 保安標籤受到詢問),以使該保安標籤之共振電路產生共 振,而提供一可被該接收器偵測到之輸出信號。此一輸出 本ίΛ張尺度國國家梯準(CNS )八槻^ ( 21〇><297公楚1 " --— -4 - (請先聞讀背面之^意事項再填寫本頁} 裝·Printed by the Central Standards Bureau of the Ministry of Economic Affairs, Shellfish Consumer Cooperative Λ7 —__ B7 V. Description of the invention (1), some backgrounds of the invention can be used to detect and prevent theft from retail establishments and / or other similar libraries Electronic Object Surveillance (EAS) systems, or unauthorized removal of items or goods, have become very popular. Generally, such a security system is a mining security tag that is fixed on or attached to an item (or its packaging). 'This item is usually accessible to potential customers or facility users at will, so it is easily accessible. Take it away without permission. Generally, such EAS systems are used to detect the presence (or absence) of a security tag and therefore a protected item in a monitored security area or detection area. In most cases, the above-mentioned detection area is located at the exit or entrance of the facility, or around a part of the facility. • A widely spread type of EAS system uses a security tag that includes its own, small, usually planar, printed circuit that resonates with a predetermined detection within a detection frequency range Under frequency. A transmitter that is also modulated at the detection frequency is used to send electromagnetic energy or an interrogation signal 'into the above-mentioned detection area. A receiver modulated at the detection frequency is located near the detection area. Generally, the transmitter and a transmitter antenna are located on one side of an exit or aisle, and the receiver and a receiver antenna are located on the other side of the exit or aisle, leaving one to leave the facility. People must pass between the antennas of these transmitters and receivers. When an article with a security tag is entering or passing through the detection area, the security tag will be exposed to the energy sent above (the security tag is questioned), so that the resonant circuit of the security tag Resonance is generated and an output signal is provided which can be detected by the receiver. This output is the National Standard for National Standards (CNS) in Japan. (21〇 > < 297 公 楚 1 " --- -4-(Please read the notice on the back before filling out this page } Loading ·

'1T A7 B7 五、發明説明(2 ) - 信號被該接收器偵測到,將表示在該偵測區域内,存在有 一附有保安標籤之物品,以及該接收器便會啟動一警铃, 警告適宜之保安人員或其他職員。 現有以上類型和其他類型之EAS系統,在防止竊盜擅 自將物品取走上,已證實係十分有效。 一特定商店或聯鎖店中所用上述類型之保安標籤,通 常係相同的。因此,所有内含保安標籤之物品,無論其尺 寸和價值如何,將傳回一相同之信號給該接收器。近來, 已開發出可傳回獨一或半獨一之辨識碼的被動共振式保安 才示籤。美國專利編號第5,446,447號(Carney et al.)、第 5,430,441 號(Bickley et al.)、和第 5,347,263 號(Carr〇u et • al.),揭示了此種保安標籤之三種範例。此等保安標籤, 通常包含一可產生上述辨識碼之積體電路。此種『智慧型』 保安標籤,可提供一些在該詢問器區域内能被偵測到、有 關該物品之額外資訊。此等智慧型保安標籤,通常可嚮應 及發送一些在射頻範圍内之信號,以及在此技藝中,係習 稱為『射頻辨識(RFID)標籤,或智慧型保安標籤』。此等 RFID標籤係用於RFID系統中。 經濟部中央標準局員工消費合作社印製 (請先聞讀背面之Ji意事項再填寫本頁) 要使RFID標籤之使用成本為最小,一般希望標籤本 身之製造成本要能很低。在許多應用例中,該等標藏並不 會再使用,故加標籤物品之成本,必得考慮到標籤之整個 成本。要降低RFID標籤之製作成本的一項問題在於,目 前所用之RFID系統,無論該標籤之應用如何必得仰賴 有一特定記憶體組態之標籤。^經常會造《記憶體空間之 本紙張尺度it用巾關家樣準(CNS ) A4祕(2!〇><297公楚 經濟部中央標準局員工消費合作社印家 Λ7 ‘ 二 ------ - B7 五、發明説明(3 ) 浪費’及/或記憶體組態不必要之複雜性。 一標藏内實際儲存之資料,將依其特定之應用而定。 舉例而5,—附著在食用產品上面之標籤,可能儲存有身 伤和新鮮度之資料’而一附著在電子產品上面之標籤,則 可能僅儲存類似型號及/或序號等產品辨識之資料。廣泛 範圍不同標籤之潛在應用,使得其很難設計出一單獨之存 取機構,可供— RFI〇標籤有效地運作於不同之應用例中。 一些實際的、有潛力的記憶體組態,附帶彼等之缺點, 將說明如下: 預先配置之記憶體:其標籤之記憶體位置,係預先嚴 格地加以配置。亦即,資料儲存之每一位元,係配置成一 .特定之機能。舉例而言,在第1圖之美國專利編號第 5,469,363(Salilga)號中’該標籤有一記憶體,其係分段成 一預定之位元組字串。每一群位元組,可執行一不同之機 能(例如,鎖碼、辨識、追蹤)。由於該等記憶體位置係預 先嚴格地加以配置,在一可能需要不同類型資訊之應用例 中,此一標籤便無法被使用。而且,若某些預先配置之機 能不再需要了,其卻仍然需要就此等未使用之機能,提供 一記憶體區段。 目錄配置式記憶體:其可以模擬電腦硬碟驅動器之記 憶體架構,其中,一目錄將可儲存每一儲存在標蕺記憶體 内之資訊區段的位置和辨識碼,加上彼等未被配置之記憶 體的位置。當需要將新的資訊寫入記憶體時,此新的資訊, 將會被寫入至彼等適當之位置。 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) U ^ ^ ί私衣-- (請先閱讀背面之&意事項再填寫本頁) 訂 .'·-1 I a^i —ί -. -6- % I Λ7 B7 五、發明説明(4 ) 在RFID標籤内使用此類型記憶趙配置策略之天生限 制是,執行-交易處理(亦即,存取—標藏)所需資訊位元 之數目相δ大。舉例而言,在該標藏之記憶趙内所儲存之 特定希望資訊的位置及/或内容被讀取及寫入前該詢問 器首先必要„賣取上述目錄之全部内容。就附有大量記憶體 之標籤而言,其目錄資訊本身,將會比所想要讀取或寫入 之資訊的尺寸大甚多。在該等RFm標藏系統中以及特 別是在該詢問器之讀取或寫入區内,可能會有許多標籤之 情況下,上述執行—項交易處理,所需要位元之大量數目, 將會限制到單位時間所能接近之標籤數目。由於如配置射 頻頻帶之政府機構⑽如’聯邦通訊委貢會(Fcc))所決定, 或如系統架構之需要所決定,僅有被選定2RF通道可 被用於RFID系統中之緣故,彼等資訊之轉移,亦會有速, 率上之限制。 在一 RFID標籤内使用目錄g己置記憶體策略之另一天 生限制是’當標籤資訊有需要做取得限制時,其接近卻很 難加以限制。在零售和租賃運作之智慧型標籤中,其有需 要將希望做接近限制之加標籤物品有關之資訊加以儲存。 某些儲存資訊之接近限制,將可防止未經授權之人員,使 不得接近上述或有可能做非法用途之資訊。舉例而言資 訊可能儲存在標籤上,以表示其加標籤物品之當前擁有權 (例如,物品是歸商店所有,或物品業已售出而歸顧客所 有)。若一不擇手段之徒,得以接近該資訊,其擁有權資 訊,便有寸能被更動,或者,其擁有權資訊,有可能自一 本紙張尺度適用中涵Si (CNS)爾 項 再 I 本 頁 裝 1 丁 經濟部中央標準局員工消費合作杜印犁 Λ7 ------------B7 五、發明説明(5 ) , ~ ~ ' 合法售出之物品被抽取出,並被存進零售商所擁有其他類 似之未售出的物品内。接著,該等未售出之物品,便可不 紐付款地自零售商處取走,而不使該&]?1〇系統產生警報, 蓋該等物品所關聯之標籤,將會包含可表示彼等已被售出 之資訊故也。 一目錄配置記憶體策略,並不具有可對資訊之接近加 以限制之有效方法。縱然存在有—可將目錄項目加以隱藏 之策略,此策略則有-天生之弱點,其係由於該等記憶趙 之任何部份,皆可直接被接近之目錄策略的有關特徵所致 之結果。其目錄儲存了與所有包含隱藏目錄項目之資訊區 塊的位置有關之資訊。人們只要直接查出此種位置,便可 找出彼等之隱藏項目。讀取標籤内所有之記憶體位置,以 及藉著使用其未隱藏之目錄冑m,來蚊標藏所包含隱藏 資訊之元整内谷,是一件相當容易之事。 現有其他之策略,可限制對所存資訊做接近。舉例而 S 可使用一鎖定鍵碼機構,其中,若要接近資訊將需 要某類(鍵碼)可解開接近門之『口令·』。此策略若使用智 慧型標蕺’將極容易受到挫敗。一竊賊只要在販賣點監 控彼等型標籤與詢問器間之交易處理,便可決定出可接= -特定資訊區塊之口令。此外,若所用係鎖定鍵喝機構, 其智慧型標籤上面,將勢必要包含額外之電子電路,以確 保除了在口令業已給定後,_ 口令所保護之記憶趙位置, 係無法被讀取到。此額外之電子電路,自將增加其標蕺之 成本和複雜性》 本紙張尺度適用中國國家標準(CNS ) A4規格( .J. I 1 1«. · •L----------^ 裝—— (請先閲讀背面之|..*江意事項再填寫本頁) 經濟部中央橾準局員工消費合作社印製 Α7 Β7 五、發明説明(ό 可提供: 護一智慧型標籤上面之資訊。加密法 ρ供優於口令鍵碼线之安全性。加密法係使用數學技 2 ’以-種無鍵碼便很難被解碼之方式,將資訊重新加以 寫像…加密方法將就該RFID系統,選擇—特定之加密 :構,以及使用它供某些或所有資訊在標藏與詢問器間做 傳遞之用。此方法具有之問題是’其加密機構終將會被獲 知’因而將會隨著時間而變得無用。 另一種加密方法,係涉及到使用一個或多個非常值之 鍵媽,以動態地設定成其加密工具。此方法係傳統上用於 需要極高程度之安全性的智慧卡』卜不幸地,資料加 密和解密之電子電路係十分昂貴,因而用於棄置式智慧型 標籤中’係下實際的。 又有一種加密方法,或可以使用前述之目錄系統,將 加也資料’儲存進記憶體内。然而,此方法亦有其缺點, 蓋加密資料較未加密資料,將取用為數甚多之位元。因此, 此方法亦具有將會增加其標籤之成本和複雜性的負面影 嚮。 經濟部中央標隼局員工消費合作社印聚 縱然有著種類繁多之技術,可用來將資訊儲存進RFID 標籤之記憶體内,而使其方式可保護該資訊,不致被未經 授權之人員讀取,或不致受到不正常之更動,其則仍需要 有一種標籤記憶體管理技術,使其資料儲存和轉移之要求 為極小、有變通性、具體實現時不貴、以及可提供足夠之 安全性,以抗拒大部份令其受到挫敗之企圖。本發明係藉 著使上述要儲存在標籤記憶體内及傳遞於標籤與詢問器間 -9- 本紙張尺度適用中國國家標準(CMS > A4说格(210X297公釐> A*7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明(7 ) 之資訊物件化,而完成以上諸需要。亦即^上述要儲存及 傳遞之資訊,係藉標籤來加以辨識及管理,而成為一群資 訊區塊或物件,彼等係各可獨一地加以辨識。 本發明之概要 本發明提供一種可用於射頻辨識(RnD)標籤之記憶 體。此記憶體係内含一個或多個物件。各物件包含:一内 含有關物品之信息資訊的資訊攔位;一可表示該資訊欄位 内其信息資訊之類型的辨識碼;和一可表示該資訊欄位内 其化息資訊之尺寸的尺寸棚位。 / 本發明之一實施例,提供有一種與物品相關聯之保安 標籤。此保安標籤内含一積體電路,其具有一記憶體,此 . 記愫體可儲存一個或多個物件,以及可於一選定之詢問信 號,S句問該保安標籤之際,輸出一個或多個物件而做為 一嚮應之信號。各物件包含:一内含有關物品之信息資訊 的資訊欄位;一可表示該資訊欄位内其信息資訊之類型的 辨識碼;和一可表示該資訊欄位内其信息資訊之尺寸的尺 寸攔位。 本發明之另一實施例,提供一種可用以使用尺1?11)標 籤之RFID監視系統。 本發明之另一實施例,提供一種可用以在一監視系統 之詢問器與一物品所關聯之保安標籤間進行溝通的方法。 該保安標籤包含一積體電路,其具有一可儲存一個或多個 物件之記憶體。各物件包含:一内含有、關物品之信息資訊 的資訊攔位、一可表示該資訊欄位内其信息資訊之類型的 (請先閲讀背面之k意事項再填寫本頁) 裝. 訂·'1T A7 B7 5. Invention description (2)-The signal detected by the receiver will indicate that there is an item with a security label in the detection area, and the receiver will activate an alarm bell, Warn appropriate security personnel or other staff. The existing EAS systems of the above and other types have proven to be very effective in preventing theft of unauthorized items. The above types of security labels used in a particular store or interlocking store are usually the same. Therefore, all items with security tags, regardless of their size and value, will return the same signal to the receiver. Recently, passive resonance security signage has been developed that can return a unique or semi-unique identification code. U.S. Patent Nos. 5,446,447 (Carney et al.), 5,430,441 (Bickley et al.), And 5,347,263 (Carrou et • al.) Disclose three examples of such security labels. These security tags usually include an integrated circuit that generates the identification code described above. This "smart" security tag can provide additional information about the item that can be detected in the interrogator area. These smart security tags can usually send some signals in the radio frequency range, and in this technology, they are known as “radio frequency identification (RFID) tags, or smart security tags”. These RFID tags are used in RFID systems. Printed by the Consumer Cooperatives of the Central Bureau of Standards of the Ministry of Economic Affairs (please read Ji's notice on the back before filling this page) To minimize the cost of RFID tags, it is generally desirable that the manufacturing cost of the tags themselves be low. In many applications, these labels will not be reused, so the cost of labeling items must take into account the entire cost of the label. One problem to reduce the manufacturing cost of RFID tags is that the RFID system currently used, regardless of the application of the tag, must rely on a tag with a specific memory configuration. ^ Often will create the "paper size of the memory space, paper towels, standard household (CNS), A4 secret (2! 〇 > < 297 Gongchu Ministry of Economic Affairs, Central Standards Bureau, staff consumer cooperatives, India Λ7 '2- -----B7 V. Description of the invention (3) Waste and / or unnecessary complexity of memory configuration. The actual data stored in a collection will depend on its specific application. For example, 5, —A label attached to an edible product may store information about personal injury and freshness', while a label attached to an electronic product may store only product identification information such as similar models and / or serial numbers. Wide range of different labels The potential applications make it difficult to design a separate access mechanism for — RFI0 tags to effectively operate in different applications. Some practical, promising memory configurations, with their shortcomings It will be explained as follows: Pre-configured memory: the memory location of its tag is strictly configured in advance. That is, each bit of data storage is configured as a specific function. For example, in the first 1 of National Patent No. 5,469,363 (Salilga) 'The tag has a memory that is segmented into a predetermined byte string. Each group of bytes can perform a different function (for example, lock code, identification, Tracking). Because these memory locations are strictly configured in advance, in an application that may require different types of information, this tag cannot be used. And, if some pre-configured functions are no longer needed, However, it still needs to provide a memory section for these unused functions. Directory configuration memory: It can simulate the memory structure of a computer's hard disk drive, where a directory can store each stored in the standard memory The location and identification code of the information section in the body, plus the location of their unallocated memory. When new information needs to be written to the memory, this new information will be written to them Appropriate location. This paper size applies Chinese National Standard (CNS) A4 specification (210X297 mm) U ^ ^ 衣 Private clothing-(Please read the & notice on the back before filling this page) Order. '· -1 I a ^ i —ί-. -6-% I Λ7 B7 V. Description of the Invention (4) The inherent limitation of using this type of memory configuration strategy in RFID tags is execution-transaction processing (that is, access-tagging) The number of required information bits is relatively large. For example, before the position and / or content of the specific desired information stored in the hidden memory Zhao is read and written, the interrogator must first be sold. The entire contents of the above catalogues. For tags with a large amount of memory, the catalogue information itself will be much larger than the size of the information you want to read or write. In these RFm tagging systems and Especially in the case where there are many tags in the read or write area of the interrogator, the above-mentioned transaction processing, the large number of bits required will be limited to the tags that can be accessed per unit time. number. As the government agencies that configure radio frequency bands, as determined by the Federal Communications Commission (Fcc), or as determined by the needs of the system architecture, only selected 2RF channels can be used in RFID systems. There will also be speed and rate restrictions on the transfer of information. Another inherent limitation of using the directory g memory strategy in an RFID tag is that when tag information needs to be restricted, its access is difficult to restrict. In smart labels for retail and rental operations, it is necessary to store information about tagged items that are expected to be close to the limit. The proximity of certain stored information will prevent unauthorized persons from accessing the information described above or which may be used for illegal purposes. For example, information may be stored on a label to indicate its current ownership of the tagged item (for example, the item is owned by the store, or the item is sold and owned by the customer). If an unscrupulous person is able to access the information, their ownership information can be changed, or their ownership information may be changed from a paper-size application of Si (CNS) to this page. Packing 1 Ding consumer cooperation of the Central Standards Bureau of the Ministry of Economy Du Yinli Λ7 ------------ B7 V. Description of the invention (5), ~ ~ 'The legally sold items are extracted and Store in other similar unsold items owned by the retailer. Then, these unsold items can be taken away from the retailer without payment, without causing the &] 10 system to generate an alert. The labels associated with these items will contain They have also been sold information. A directory configuration memory strategy does not have an effective way to restrict access to information. Even if there is a strategy that can hide directory items, this strategy has a natural weakness, which is the result of any feature of these strategies that can be directly accessed by any part of these memories. Its directory stores information about the location of all information blocks containing hidden directory entries. People can find out their hidden items by simply finding out such locations. It is quite easy to read all the memory locations in the tag, and to use the unhidden directory 胄 m to get to the inner valley of the hidden information contained in the mosquito tag collection. Other existing strategies can limit access to stored information. For example, S can use a locked key code mechanism. Among them, to access information, a certain type (key code) is required to unlock the "password ·" of the access door. This strategy will be frustrated if it uses smart tags. As long as a thief monitors the transaction processing between their tag and the interrogator at the point of sale, they can determine the password that can be accessed =-specific information block. In addition, if the key-lock mechanism is used, it will be necessary to include additional electronic circuits on its smart label to ensure that the location of the memory protected by the password cannot be read except after the password has been given. . This additional electronic circuit will increase the cost and complexity of its standard "This paper size applies to China National Standard (CNS) A4 specifications (.J. I 1 1«. · · L -------- -^ 装 —— (Please read the | .. * Jiang Yi Matters on the back before filling out this page) Printed by the Employees' Cooperatives of the Central Procurement Bureau of the Ministry of Economic Affairs Α7 Β7 V. Description of the invention (ό Available: Huyi Smart Information on the label. Encryption method ρ provides better security than password key code lines. Encryption method uses mathematical techniques 2 'It is difficult to decode in a way without key codes, and the information is rewritten like encryption method ... With regard to the RFID system, it will choose-specific encryption: structure, and use it for some or all information to pass between the tag and the interrogator. The problem with this method is that 'its encryption mechanism will eventually be known 'Thus will become useless over time. Another encryption method involves the use of one or more outliers to dynamically set it as its encryption tool. This method is traditionally used for applications that require extremely high levels of encryption. Degree of security smart card "unfortunately, data plus Encrypted and decrypted electronic circuits are very expensive, so they are used in 'disposable smart tags'. They are practical. There is another encryption method, or the aforementioned directory system can be used to store Canadian data in memory. However, this method also has its shortcomings. Covering encrypted data will take many bits than unencrypted data. Therefore, this method also has a negative impact on the cost and complexity of its label. Ministry of Economic Affairs Although the Central Printing and Labelling Bureau's consumer co-operative printing club has a wide range of technologies, it can be used to store information in the memory of RFID tags, so that it can protect the information from being read by unauthorized persons or not. Under abnormal changes, it still needs a tag memory management technology to make its data storage and transfer requirements minimal, flexible, inexpensive to implement, and provide sufficient security to resist large Part of the attempt to frustrate the present invention is to make the above-mentioned to be stored in the tag memory and passed between the tag and the interrogator The standard is applicable to the Chinese national standard (CMS > A4) (210X297mm > A * 7 B7) printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs. 5. The information objectification of the invention description (7) fulfills the above needs. That is, the above-mentioned information to be stored and transmitted is identified and managed by tags, and becomes a group of information blocks or objects, each of which can be uniquely identified. SUMMARY OF THE INVENTION The present invention provides a method that can be used for Memory of radio frequency identification (RnD) tags. This memory system contains one or more objects. Each object contains: an information block containing information about the item; an information block that can indicate its information in the information field An identification code of the type; and a size booth that can indicate the size of its information in the information field. / An embodiment of the present invention provides a security tag associated with an article. This security tag contains an integrated circuit, which has a memory, so that the memory can store one or more objects, and can output a or Multiple objects as a consistent signal. Each object contains: an information field containing information about the item; an identification code that indicates the type of information information in the information field; and a size that indicates the size of the information information in the information field Stop. According to another embodiment of the present invention, an RFID monitoring system capable of using a tag 1 to 11) is provided. Another embodiment of the present invention provides a method for communicating between an interrogator of a surveillance system and a security tag associated with an article. The security tag includes an integrated circuit having a memory capable of storing one or more objects. Each object contains: an information block containing information related to the item, and an information type that can indicate the type of information in the information field (please read the notice on the back before filling this page).

-10- 經濟部中央榡準局貝工消費合作社印製 Λ7 'Τ'''~ ---—— 五、發明説明(8 ) —--一~----- 辨識碼、和-可表示該資訊棚位内其信息資訊之尺寸的尺 寸攔位。上述方法所包含之步驟有:自該詢問器發送出— 凊求信號’此請求信號含有一物件辨識瑪;接收一保安標 籤内之請求信號;搜尋上述之保安標藏記憶體,以決定其 中是否存有所請求之物件;以及若所請求之物件,係儲存 在該保安標籤記憶體内,則至少發送上述所請求物件之資 訊攔位和尺寸巍。其發送㈣係由該詢問ϋ來加以接 收。 ^本發明之另一實施例,提供—種可用以在一監視系統 之詢問器與-物品所關聯之保安標鐵間進行互動的協定。 該保安標蕺包含-積體電路’其具有一可儲存一個或多個 物件之記憶體。各物件包含:一内含有關所關聯物品之信 息資訊的資訊棚位、-可表示該資訊搁位内其信息資訊之 類型的辨識碼、和一可表示該資訊欄位内其信息資訊之尺 寸的尺寸攔位。上述方法所包含之步驟有:自該詢問器發 送一控制訊息,此控制訊息含有一物件辨識碼;接收一保 2標藏内之控制訊息;搜尋上述之保安標籤,以決定該保 女標籤内,是否儲存有上述物件辨識碼所屬之物件;以及 若該物件係儲存在該保安標籤内’則執行一控制機能。此 控制機能可以是:使上述之保安標籤發送該物件;自其記 憶體清除該物件;更改其記憶體,期使該物件無法被清除; 或者改變其記憶體内所儲存物件之資訊欄位的内容值。 圖示之簡要說明 本發明以上之概要,以及下文對其較佳實施例之詳細 本紙張尺度適用中國國家標準(CNS )八4規格(2Ι〇χ297公楚)-10- Printed Λ7 'Τ' '' ~ by the Central Bureau of Quasi-Ministry of Economic Affairs of the People's Republic of China. ------- V. Description of the invention (8) ----- ~~-Identification code, and-可A size stop indicating the size of the information in the information booth. The above method includes the following steps: send out from the interrogator-request signal 'this request signal contains an object identification tag; receive a request signal in a security tag; search the aforementioned security tag memory to determine whether it is The requested object is stored; and if the requested object is stored in the security tag memory, at least the information block and size of the requested object are sent. Its transmission is not received by the inquiry. ^ Another embodiment of the present invention provides an agreement that can be used to interact between an interrogator of a surveillance system and a security tag associated with an item. The security tag includes an integrated circuit 'which has a memory that can store one or more objects. Each object contains: an information booth containing information about related items, an identification code that can indicate the type of information in the information booth, and a size that can indicate its information in the information column Size stops. The above method includes the following steps: sending a control message from the interrogator, the control message contains an object identification code; receiving a control message in a Bao 2 tag collection; searching for the above security tag to determine the Bao Nu tag , Whether the object to which the above-mentioned object identification code belongs is stored; and if the object is stored in the security tag ', a control function is performed. This control function can be: making the above security tag send the object; clearing the object from its memory; changing its memory so that the object cannot be cleared; or changing the information field of the object stored in its memory Content value. Brief description of the drawings The above summary of the present invention, and the following detailed description of its preferred embodiments The paper size is applicable to China National Standard (CNS) 8-4 specifications (2Ιχχ297)

JT— n i- I IT n I UN ϋ. I (請先閲讀背面之k項再填寫本頁) -訂- -11 - 經濟部中央橾準局貝工消费合作社印策 Λ7 _____ . B7____ 五、發明説明(9 ) 說明,將可配合所附諸圖所做之閱讀,而更臻明確。基於 本發明之例示計,圊中所示係當前較佳之實施例。然而, 理應瞭解的是’本發明並非僅限於所示一成不變之裝置和 方法。諸圖中: 第1圖係本發明所適用之保安標藏的方塊示意圖; 第2圖係本發明所適用之詢問器的功能方塊示意圖; 第3圖係與第1圖中用以儲存一個或多個物件有關之 保安標蕺的記憶體,其内容之一表示圖; 第4圖係一與第1圖之保安標籤有關之樣本記憶體的功 能方塊圖,其係顯示一與可儲存一個或多個物件有關之記 憶體配置策略; . 第5圖係物件辨識碼相對彼等對應信息資訊之一樣本 關聯表; 第6A和6B圖係該等與使用第丨圖之保安標藏有關,其 中儲存有一個或多個物件,其第一和第二系統環境之示意 方塊圊;而 第7圖則係一可偵測出一保安標籤是否遭到篡改之程 序的流程圖。 本發明之詳細說明 本說明書中所用之某些技術,僅係權宜之計,不應視 為對本發明之一種限制。諸圊中,相同之參考數字,係用 來在各個圖中,表示相同之元件。JT— n i- I IT n I UN ϋ. I (please read the k items on the back before filling this page) -Order- -11-Impression of Shellfish Consumer Cooperatives, Central Procurement Bureau, Ministry of Economic Affairs Λ7 _____. B7____ V. Description of the invention (9) The description will be more clear with the readings of the attached drawings. Based on the exemplification of the present invention, what is shown in 圊 is the currently preferred embodiment. It should be understood, however, that the invention is not limited to the illustrated apparatus and methods. In the drawings: Figure 1 is a block diagram of a security label applicable to the present invention; Figure 2 is a functional block diagram of an interrogator to which the present invention is applied; Figure 3 and Figure 1 are used to store one or The memory of the security label associated with multiple objects, one of which is a diagram; FIG. 4 is a functional block diagram of the sample memory related to the security label of FIG. 1, which shows a memory that can store one or Memory allocation strategies related to multiple objects; Figure 5 is a sample association table of object identification codes relative to their corresponding information; Figures 6A and 6B are related to the use of security labels in Figure 丨, where One or more objects are stored, the schematic blocks of the first and second system environments; and FIG. 7 is a flowchart of a procedure that can detect whether a security tag has been tampered with. DETAILED DESCRIPTION OF THE INVENTION Certain techniques used in this specification are merely expedient and should not be viewed as limiting the invention. In the various texts, the same reference numerals are used in the drawings to represent the same elements.

I 第1圖係顯示本發明所適用之一樣本保安標蕺1〇,此 保安標籤10有一被動式共振射頻(RF)電路12,其如本技藝 本紙乐尺度適用中國國家橾準(CNS ) A4規格(210X297公趁) (請先閲讀背面之注意事項再填寫本頁) 裝· 訂 -12- 五 發明説明(10 A7 B7 經濟部中央標準局貝工消費合作社印製I Figure 1 shows a sample security label 10 applicable to the present invention. The security label 10 has a passive resonant radio frequency (RF) circuit 12 which conforms to the Chinese National Standard (CNS) A4 standard as the paper scale of this technique. (210X297) (Please read the notes on the back before filling out this page) Binding · Order -12- Five Inventions (10 A7 B7 Printed by the Shellfish Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs

所熟知,係當該標_在_受到—讀取器或詢問器監控 時,用做_之用…習知型式之電路12,係包含一線圈 天線14和-電容器16,彼等可共同形成__具有_預定(運 作)之共振頻率(亦即,上述選定之射頻)。該保安標藏10 有關之電力’係以-傳統之方式,得自該天線Μ。此外, 該保安標蕺1G有-龍電路(Ic)18,其可提供『信息』給 該保安標籤10。此(IC)18係與該電路12相連接。該ic μ 係如下文所述,有-可程序化記憶體2G,其可儲存辨識碼 和其他資料之位元。該IC 18可於有足夠之電力施於其上 時,輸出一由儲存資料所構成之資料流。在本發明之一實 施例中’該資料流可產生—字串資料脈波,其係藉著在該 等資料脈波期間’使-跨接在該線圈天線14兩端之外加電 容器(未不出)做交換而成。此將會改變該RF電路12之共振 頻率,使其失調而離開其運作頻率。因此,該RF電路12 不再是傳回一單一運作頻率下之單一嚮應信號,而是傳回 一内含來自記憶體20之程式化資訊封包的調變信號。該資 訊封包(資料脈波),會被上述詢問器接收電路接收到及做 處理,以及被解碼(有必要時),而提供與上述加標籤物品 有關之辨識碼及/或其他資訊。其他使用該IC記憶體2〇内 之資料,來輸出上述出自保安標籤1〇之辨識資料的方法, 係屬本發明之範圍。上述IC 18最好亦為一被動式裝置, 以及係在如同RF電路12之方式下加以供電(亦即,使用在 天線14處所接收,來自詢問器之發送器信號的能量)。該 保安標籤10因而係一所謂之RFID標籤。其他型式之rFID 私紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐〉 (請先閲讀背面之&意事項再填寫本頁) 裝.It is well known that when the target is under the supervision of a reader or an interrogator, it is used for the purpose of the conventional circuit 12, which includes a coil antenna 14 and a capacitor 16, which can be formed together. __ Have_ a predetermined (operating) resonance frequency (ie, the selected radio frequency above). The electricity 'associated with the security label 10 is obtained from the antenna M in a conventional manner. In addition, the security tag 1G has a dragon circuit (Ic) 18, which can provide "information" to the security tag 10. This (IC) 18 is connected to the circuit 12. The ic μ is described below, with-Programmable memory 2G, which can store identification bits and other data bits. The IC 18 can output a data stream composed of stored data when sufficient power is applied thereto. In one embodiment of the present invention, 'the data stream can generate-a string data pulse wave, which is made by adding a capacitor (not without a capacitor) across both ends of the coil antenna 14 during the period of the data pulse wave'. Out). This will change the resonance frequency of the RF circuit 12 and cause it to tune away from its operating frequency. Therefore, the RF circuit 12 no longer returns a single response signal at a single operating frequency, but returns a modulation signal containing a stylized information packet from the memory 20. The information packet (data pulse) will be received and processed by the above-mentioned interrogator receiving circuit, and decoded (if necessary) to provide an identification code and / or other information related to the above-mentioned tagged item. Other methods of using the data in the IC memory 20 to output the above identification data from the security tag 10 are within the scope of the present invention. The above-mentioned IC 18 is also preferably a passive device and is powered in a manner similar to that of the RF circuit 12 (i.e. using the energy received at the antenna 14 from the transmitter signal of the interrogator). The security tag 10 is thus a so-called RFID tag. Other types of rFID private paper standards are applicable to China National Standard (CNS) A4 specifications (210X297 mm> (Please read the & intention on the back before filling this page).

-、1T -13 - 經濟部中央揉準局員工消費合作社印製 Λ7 B7 五、發明説明(11) , 標籤,亦可用於本發明中》其他具有可適用做保安標籤10 之.部份電路的RFID標籤範例,可見於美國專利編號第 5,446,447號(Carney et al·)、第 5,430,441 號(Bickley et al·)、 和第 5,347,263號(Carroll et al.)。 第2圖係一典型適用於第1圖之保安標籤1〇的讀取器或 詢問器22。此等詢問器22和保安標籤1〇,如本技藝所熟知, 係藉電感耦合來做通訊。該詢問器22包含:一發送器24、 一接收器26、一天線組體28、和一資料處理和控制電路3〇, 彼等各係具有輸入端和輸出端。該發送器24之輸出端,係 連接至上述接收器26之第一輸入端,以及連接至上述天線 組體28之輸入端。該天線組體28之輸出端,係連接至上述 . 接收器26之第二輸入端。上述資料處理和控制電路3〇之第 一和第二輸出端,係分別連接至該等發送器24之輸入端和 接收器26之第三輸入端。此外,上述接收器26之輸出端, 係連接至該資料處理和控制電路3 〇之輸入端。一具有此種 一般組態之詢問器,可使用所有頒給Walton之美國專利編 號第 3,752,960號、第 3,816,708號、第 4,223,830號、和第 4,580,041號中所敘述之電子電路,來加以建立,彼等可 藉其全文之參照而合併至此說明書内。上述詢問器22之實 體具現’係藉其特定之應用例(例如,做盤存、監控出口、 給帳)來做描述。上述詢問器22兩個已知適用於本發明之 實體,係一對新穎的臺座(未示出)和一手持式RFID掃描 器。 在本發明之此一較佳實施例中,有一預定組之保安標 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) -14- -----------^ -裝------訂------V (請先閲讀背面之-¾一意事項再填寫本頁) 經濟部中央標準局貝工消費合作社印犁 A7 * --- -----^B7 五、發明説明(12) Γ '' 籤10,被製備來與一些預定之物品相關聯。詳言之,該等 保安標籤10,在製備上係關聯及施加至一預定組之物品(未 示出)上面,各保安標籤10均指定有獨一的或半獨一的保 安標籤資訊,該等保安標籤10可因而加以程式化’以及可 直接附著在各物品或各物品之包裝上面。或者,該等標籤 10可在施加至物品上面後方做程式化,在所揭示之實施例 中’各物品係與一保安標籤1 0相關聯。 第3圖係一標蕺10之記憶體20内其非揮發性記憶體配 置之方塊圖,其係描繪該標籤10之記憶體2〇内所儲存之資 訊區塊或物件32。每一物件32至少包含:一内含有關上述 加標籤物品之信息資訊的資訊欄位34; 一可表示該資訊欄 位34内其信息資訊之類型的辨識碼36 ;和一可表示該資訊 攔位34内其信息資訊之尺寸的尺寸欄位38。在某些應用例 中,該記憶體20僅存有一物件32。在其他應用例中,該記 憶艘20係存有兩個或多個物件32。每一記憶艘20有一獨一 之辨識碼36。一標籤1〇内可儲存物件32之最大數目,僅係 受限於記憶體20之尺寸和該等物件32之尺寸。 在第3圖中所示之範例中,該辨識碼36之長度為四位 元’可谷許有16個不同之辨識碼36。在本發明一商業適用 之實施例中’該辨識碼36可有某些類似32位元碼之其他尺 寸。在第一物件32中,其資訊欄位34係具有一 16位元之長 度’故其尺寸欄位38為一二進位之16值或『10000』。在 I 第二物件32中’其資訊欄位之長度為π位元,故其尺寸欄 位38為一二進位之20值或『1〇1〇〇』。該資訊欄位34之長 (請先閲讀背面之k意l再填寫本頁) • n ^Lr · 裝 ,ιτ i J· 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公楚:) -15- Λ7 B7 經濟部中央標準局員工消費合作社印聚 五、發明説明(13 ) 度,可依一單一標籤内物件之不同或標籤之不同而做改 變。第3圖係顯示兩個具有相同位元數目之辨識碼%。就 一即疋RFID標籤和詢問器之系統而言,其辨識碼36和尺 寸攔位38之長度,最好是一樣(亦即,一即定系統内之所 有‘藏ίο,最好是具有相同位元長度之辨識瑪36和尺寸欄 位38)。然而,該等系統内之所有標籤1〇,係可依系統之 不同而做變化。該等辨識碼36和尺寸欄位38之可變長度, 係在本發明之範圍内,但其並不很合宜,蓋彼等將會增加 資料儲存桌略、標籤詢問步驟、和物件存取處理程序等之 複雜性故也。 在先存技藝式類似第4圖所例示、美國專利編號第 5’469,363號(Saliga et al.)之標籤記憶體配置策略中,係使 用一連續字串之記憶體位置,來儲存標藏資料。在本發明 中,該物件32之儲存,並不需要有一連續字串之資料位元 或位元組》此外,該物件32係可壓縮,故以壓縮形式視之, 其可以不必與其實際資訊類似。因此,第3圖僅係顯示上 述k藏a己憶體20内所儲存資料之類型.,而非其中所組織或 儲存之資料的較佳方式。 第4圖係顯示一標籤記憶體20内有關儲存一個或多個 物件3 2之έ己憶體配置的範例。第4圖中之方法,係先存技 藝式鏈結表列資料結構之修訂本。在第4圖中,該記憶體2〇 有五個儲存在記憶體空間之連續列内的物件32,每一物件 包含:一辨識碼36(ID)、一尺寸欄位38(sz)、和一資訊攔 位34(INF)。一選擇性之資訊攔位結束碼39(E〇D),可置於 (:裝------訂------J. (請先閲讀背面之_注意事項再填寫本頁)-, 1T -13-Printed by the Consumer Cooperative of the Central Bureau of the Ministry of Economic Affairs, Consumer Cooperative Λ7 B7 V. Description of the invention (11), the label can also be used in the present invention. Examples of RFID tags can be found in US Patent Nos. 5,446,447 (Carney et al.), 5,430,441 (Bickley et al.), And 5,347,263 (Carroll et al.). Figure 2 is a reader or interrogator 22 typically applicable to the security tag 10 of Figure 1. These interrogators 22 and security tags 10, as is well known in the art, communicate via inductive coupling. The interrogator 22 includes a transmitter 24, a receiver 26, an antenna group 28, and a data processing and control circuit 30, each of which has an input terminal and an output terminal. The output of the transmitter 24 is connected to the first input of the receiver 26 and the input of the antenna assembly 28. The output end of the antenna assembly 28 is connected to the second input end of the receiver 26 described above. The first and second output terminals of the above data processing and control circuit 30 are connected to the input terminal of the transmitter 24 and the third input terminal of the receiver 26, respectively. In addition, the output terminal of the receiver 26 is connected to the input terminal of the data processing and control circuit 30. An interrogator with this general configuration can be built using the electronic circuits described in all U.S. Patent Nos. 3,752,960, 3,816,708, 4,223,830, and 4,580,041 issued to Walton. It may be incorporated into this specification by reference of its entirety. The physical manifestation of the interrogator 22 described above is described in terms of its specific application examples (for example, inventories, monitoring exports, and accounting). The above-mentioned interrogator 22 is two known entities suitable for use in the present invention, a novel pair of pedestals (not shown) and a handheld RFID scanner. In this preferred embodiment of the present invention, a predetermined set of paper sizes of security specimens is applicable to the Chinese National Standard (CNS) A4 (210X297 mm) -14- ----------- ^- Install ------ order ------ V (please read the first -¾ of the notice on the back before filling out this page) Central Standards Bureau of the Ministry of Economy, Shellfish Consumer Cooperatives, India Plow A7 * --- ---- -^ B7 V. Description of the invention (12) Γ '' Sign 10, prepared to be associated with some predetermined items. In detail, the security tags 10 are related to preparation and applied to a predetermined group of items (not shown), and each security tag 10 is assigned unique or semi-unique security tag information. The security label 10 can thus be stylized 'and can be directly attached to each item or the packaging of each item. Alternatively, the tags 10 may be stylized after being applied to the item, and in the disclosed embodiment, each item is associated with a security tag 10. FIG. 3 is a block diagram of the non-volatile memory configuration in the memory 20 of the tag 10, which depicts the information blocks or objects 32 stored in the memory 20 of the tag 10. Each object 32 includes at least: an information field 34 containing information about the above-mentioned tagged items; an identification code 36 that can indicate the type of information information in the information field 34; and an information block that can indicate the information block The size field 38 of the size of the information in the bit 34. In some applications, the memory 20 stores only one object 32. In other application examples, the memory ship 20 stores two or more objects 32. Each memory ship 20 has a unique identification code 36. The maximum number of objects 32 that can be stored in a tag 10 is limited only by the size of the memory 20 and the size of the objects 32. In the example shown in Fig. 3, the length of the identification code 36 is four bits. There may be 16 different identification codes 36. In a commercially applicable embodiment of the present invention 'the identification code 36 may have some other dimensions similar to a 32-bit code. In the first object 32, its information field 34 has a length of 16 bits', so its size field 38 is a binary value of 16 or "10000". In I second object 32 ', the length of its information field is π bits, so its size field 38 is the value of 20 in binary or "1〇〇〇〇". The length of the information field is 34 (please read the meaning on the back and then fill out this page) • n ^ Lr · equipment, ιτ i J · This paper size applies to China National Standard (CNS) A4 specifications (210X297): -15- Λ7 B7 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs of the People's Republic of China 5. The description of the invention (13) can be changed according to the difference of objects in a single label or different labels. Figure 3 shows two identification codes% with the same number of bits. In the case of a system of RFID tags and interrogators, the length of the identification code 36 and the size stop 38 is preferably the same (that is, all the 'hidden' in the given system are preferably the same Bit length identification 36 and size field 38). However, all tags 10 in these systems are subject to change from system to system. The variable lengths of the identification code 36 and the size field 38 are within the scope of the present invention, but they are not very suitable. Gaby will increase the data storage schedule, label inquiry steps, and object access processing. The complexity of procedures and so on. In the pre-existing technique similar to the example illustrated in Fig. 4, the US Pat. No. 5'469,363 (Saliga et al.) Tag memory allocation strategy uses a continuous string of memory locations to store the tag data . In the present invention, the storage of the object 32 does not need a continuous string of data bits or bytes. In addition, the object 32 is compressible, so it may not be similar to its actual information when viewed in a compressed form. . Therefore, Fig. 3 only shows the type of data stored in the above-mentioned k-z-a memory 20, and is not a preferred way of organizing or storing the data therein. FIG. 4 shows an example of the memory configuration of one or more objects 32 in a tag memory 20. The method in Figure 4 is a revised version of the pre-existing technology linked list data structure. In Figure 4, the memory 20 has five objects 32 stored in consecutive rows in the memory space. Each object includes: an identification code 36 (ID), a size field 38 (sz), and An information block 34 (INF). An optional information stop code 39 (EOD) can be placed in (: installation ------ order ------ J. (Please read the _ Cautions on the back before filling in this page )

-16- Λ7 B7 經濟部中央標準局員工消费合作社印製 五 '發明説明(14) 最後儲存物件32之末端。記憶體在配置上係自左至右及自 上至下"當就一特定物件搜尋記憶體20時,其記憶艘管理 程式(未示出)將會檢查每一ID和SZ欄位36、38。由該記憶 體20之左上角開始,每一 id攔位36,係與要搜尋物件之 辨識碼做比較。若彼等不相同,其記憶體管理程式便會以 對應ID、SZ、和INF攔位之和,來增加一位址向量(p〇inter) 之值,而朝右下方指向次一物件32iID欄位(其INF欄位之 尺寸,係知·自其SZ欄位此處理程序將會一再重複.,直 至一 ID欄位與所搜尋者能相匹配為止,或直至其最後之 物件業已被檢查完畢(舉例而言,如所示藉著到達其E〇D 棚位39,在一段預定時間過後,未能找出另一1〇攔位, 或者藉著其他任何適當之方法)為止。 當一物件32加至第4圖之記憶體20内時,其將總是加 至所鏈結表列之末端。若一E〇D欄位39被使用到其將會 移至所有物件32之末端。當有一物件32自第4圓之記憶體2〇 刪除時,所有跟在所刪除物件後面之物件32,將會在空間 上向後做移動,故在該等連續之物件32間,並不會遺留下 任何空隙。 第4圖之記憶體配置策略,亦可修改成在非連續性之 位置内儲存多數之物件32,只是此—策略可能會降低其儲 存效率’以及會增加其物件搜尋之複雜性。第5圖一樣本 關係表4G ’其係表示該等辨識碼36與對應資訊欄位相關 狀信息資訊間的關係。舉例而言,—辨識碼Μ〇〇ι』, 可能係與—包含所加標籤之物品其職日(例如,12/30/97 ----------'裝------訂-----二· (請先閲讀背面之u項再填寫本頁)-16- Λ7 B7 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs 5 'Explanation of the invention (14) The end of the last stored object 32. The memory is arranged from left to right and top to bottom " When searching for memory 20 for a specific object, its memory management program (not shown) will check each ID and SZ field 36, 38. Starting from the upper left corner of the memory 20, each id block 36 is compared with the identification code of the object to be searched. If they are not the same, the memory management program will increase the value of the bit vector (pinter) by the sum of the corresponding ID, SZ, and INF blocks, and point to the next object 32iID column to the lower right. (The size of its INF field is known. Since its SZ field, this process will be repeated again and again. Until an ID field can match the searcher, or until its last object has been checked. (For example, as shown, by arriving at its EOD booth 39, after a predetermined period of time, failed to find another 10 stop, or by any other appropriate method). When an object When 32 is added to the memory 20 in Figure 4, it will always be added to the end of the linked list. If an EOD field 39 is used, it will be moved to the end of all objects 32. When When an object 32 is deleted from the memory 20 of the fourth circle, all the objects 32 following the deleted object will be moved backwards in space, so there will be no remaining among these consecutive objects 32 Any gap. The memory allocation strategy in Figure 4 can also be modified to be in a discontinuous position. There are a large number of objects 32, just this—the strategy may reduce its storage efficiency 'and increase the complexity of its object search. Figure 5 The same relationship table 4G' It means that these identification codes 36 are related to the corresponding information fields The relationship between the status information. For example, —identification code Μ〇〇ι ′, may be related to—including the date of employment of the tagged item (for example, 12/30/97 --------- -'Equipment ------ order ----- two · (Please read the u items on the back before filling this page)

17- Λ7 Β7 經濟部中央樣準局貝工消費合作社印製 發明説明(I5 ί ο 1/06/98)之資訊棚位34相關聯,而一辨識瑪1〇1〇,可能 係與一物品擁有權(例如,商店X或購買顧客Υ)相關聯。 該k訊欄位34内之資料’在類似到期日等之情況下,係可 被固定或敎,或者在類似-物品擁有者之情況下,係可 變的肖以改變-標籤之記憶趙内所儲存資料之能力, 係為一般所熟悉,故其細節將不再多做說明。在第5圖中, 該資訊欄位34内之資料,係表段m訊。然而,在 單一之資訊欄位34内,表示一段以上之信息資訊,係屬 本發明之範圍。而且,該資訊爛位34内之位元或位元組的 數目’係可超過要儲存想要信息資訊所需之數目。因此, 該資訊欄位34可為四位元組的數目,即使該擁有權或到期 日,有可能係在少於四個位元組内被編碼成亦然。 復參考第3圖,每一物件32之記憶體管理,僅需要兩 ί又資訊’彼等之辨識碼36和其尺寸欄位38。誠如上文所述, 其辨識碼36係需要用來唯一地辨識出上述標籤1〇上面所儲 存之每一物件32 ^其尺寸欄位38係需要用來瞭解如何劃定 該物件32之界限,藉以使其資訊攔位34,能正確地被抽取 來。其尺寸攔位38亦可選擇性地用來配置該標籤記憶體 20内之空間。 要在一標籤10上面儲存信息資訊,諸如當該標籤丨〇初 次加入服務而附著在一物品時,將會執行以下之步驟: (1)整個物件32係藉一詢問器22送給該標籤10。該物 件32之諸部分可以任意之次序發送,只要有方法正確劃定 其標籤記德體20内各個部分之界限便可。 卜Γ1--厂袭------訂-------^ |_11_K——·__:__K__:__ (請先閲讀背面之Ji意事項再填寫本頁}17- Λ7 Β7 The information booth 34 of the invention description (I5 ί 1/06/98) printed by the Shell Specimen Consumer Cooperative of the Central Procurement Bureau of the Ministry of Economic Affairs is associated with an identification mark 1010, which may be related to an item Ownership (for example, store X or purchase customer Υ) is associated. The information in the k-message field 34 can be fixed or suffocated in the case of similar expiration dates, etc., or in the case of similar-item owners, it can be changed to change the tag memory. The capabilities of the stored data are generally familiar, so the details will not be explained in more detail. In FIG. 5, the information in the information field 34 is the information in the table segment m. However, it is within the scope of the present invention to indicate more than one piece of information in a single information field 34. Moreover, the number of bits or bytes' in the information bit 34 may exceed the number required to store the desired information. Therefore, the information field 34 can be the number of four bytes, even if the ownership or expiration date may be encoded in less than four bytes. Referring again to FIG. 3, the memory management of each object 32 only needs two information ′ their identification code 36 and its size field 38. As mentioned above, its identification code 36 is required to uniquely identify each object 32 stored on the above label 10, and its size field 38 is required to understand how to delimit the object 32. By doing so, the information block 34 can be correctly extracted. The size stop 38 can also be selectively used to configure the space in the tag memory 20. To store information on a tag 10, such as when the tag is first attached to an item and attached to an item, the following steps will be performed: (1) The entire object 32 is sent to the tag 10 by an interrogator 22 . The parts of the object 32 can be sent in any order, as long as there is a method to correctly delimit the parts in the tag body 20. Bu Γ1--factory attack ------ order ------- ^ | _11_K—— · __: __K __: __ (Please read Ji's notice on the back before filling this page}

本紙張尺度適用中國國家標準(CNS ) Α4規格(210X297公1 (2)該標籤10將決定其是否可儲存該物件32。果如是, 該物件32將會被儲存,以及會有—認可訊息,傳回給該詢 問器22。該詢問器22並;};控制如何將物件32儲存進標籤ι〇 内,該標籤10亦不將此種資訊回傳給該詢問器22。若該標 蕺1〇無法儲存該物件32,料有_失敗訊息,傳回給該詢 問器22。 該物件32最好能就額外之安全性及/或錯誤偵測和修 正做編碼。此編碼步驟可能會涉及到將額外的、多餘位元 的、可能或可能未儲存在該標籤記憶體2〇内的資訊加給 該物件32。 要自一標籤10讀取資訊,將會執行以下之步驟: (1) 詢問器22將會發出一要求該標籤1〇發送一特定物 件之信號。舉例而言,此信號可能會要求該標籤1〇,發送 其日期物件(亦即,此物件具有辨識碼1〇〇1)。該信號可能 會不斷地被發送,或者僅會發送一次或某一具體之次數。 (2) 若該標籤10包含一資料物件,該標籤1〇最好能嚮 應而發送上述之整個物件32。或者,該標蕺1〇可嚮應僅發 送上述物件32之資訊攔位34和尺寸欄位38 ^若該標籤1〇並 未包含一資料物件,則會有一失敗訊息或其他類型之預定 訊息,傳回給該詢問器22。或者,並無標籤發送之動作發 生,以及此發送動作之不存在,將會被該詢問器22,解讀 成該標臧10上面並不存在此種物件32之一種意義。 上述步驟(1)之讀取處理程序,可前接一詢問器控制 訊息,以尋問一特定物件32,是否係儲存在一標上面。 經濟部中央梂準局員工消費合作社印製 A7 -----_B7 五、發明説明(17 ) ' ~ 若所接收係一肯定之嚮應,其處理程序,則將如以上所述 地繼續進行。 當自一標籤10讀取出一物件32時,彼等之辨識碼36和 尺寸欄位38,最好能在其資訊欄位34前被讀取出。此係由 於該資訊攔位34之尺寸’在其尺寸攔位38被解碼前係未知 故也。知道該資訊攔位34之尺寸,將有助於決定該資訊棚 位34之傳送,是否業已完成。然而,該物件32之諸部分係 可以任意之次序發送,只要有方法正確劃定出其各個部分 之界限便可。 第6A和6B圖係一使用其中存有物件之標籤丨〇其rfid 系統之示意方塊圖。在第6A圖中,一電腦42可發送一些 .控制信號給該詢問器22,並且可自其接收到RFm標籤資 料。此電腦42可在有需要時,接近上述之資料庫表4〇。在 第6B圖中’該資料庫表40係合併在該詢問器22内。 該等物件之使用,可容許該詢問器22,做有關請求之 選擇性動作,以及可容許該標籤1〇,嚮應上述之請求,做 有關執行之選擇性控制機能。上述之該詢問器請求,可被 視為一控制訊息。此控制訊息包含一物件辨識碼36❶有一 此種控制訊息,係用來請求該標籤1〇,發送一具有特定辨 硪碼36之物件32。另有一控制訊息,則係用來請求該標籤 1 〇,若其含有所請求之物件32 ,能做出肯定之嚮應,而不 實際傳送出該物件。另一控制機能,可能是自該標籤記憶 體20清除該物件32。再有一控制機能,則可能是變更一特 疋物件32之資訊攔位34的内容,以至於可表示其標籤所確 本紙張尺度朝巾關家縣(cns ) A4祕( "210X297公廣)~' (請先閲讀背面之注意事項再填寫本頁) -訂 -20 - 經濟部中央標準局貞工消費合作社印聚 Λ7 B7 五、發明説明(18 ) 定之物品’其擁有權業已自商店轉讓給顧客。再有一控制 機能,可能是將該物件32敎進上述之標籤記憶體2〇内, 以至於可變更該標籤1G之記憶㈣,而使該物件32無法被 更動或被清除》其他之控制機係屬本發明之範圍。 如以上所述將資料存入一標藏1〇内較現有之標藏資 料儲存技術,係具㈣紅優點。其_主要優w,該標 籤1〇之記憶體配置策略,對該詢問器22係隱匿的。亦即, 該詢問器22在與標籤轉通及執行相對於其標籤資料之希 望動作上’並不知道(不必知道)資料是如何儲存在該標藏 1〇之記憶體20内。其標籤冗18之内部運作,可加以隱藏, 並與其資訊轉移之運作分開。此事實之一#益在於,不同 之標籤應用,既不必改變其詢問器22,亦不必改變其協定。 此獨立性可容許設計師將特徵合併進上述標籤之ic 18 内,而不必改變該尺打0系統之其餘部分,或其詢問器/ 標籤間之通訊協定。舉例而言,資料壓縮技術可應用至該 標籤1C 18,以減少所儲存記憶體之位元數目,而使其詢 問器22,甚至不必知道該資料壓縮技術正在執行。當rfid 標蕺用於需要儲存大量資料之應用例中時,上述之資料壓 縮技術,係特別具有吸引力。 上述標籤/詢問器間之通訊協定,與該等使用目錄方 法來管理資料之系統相較,將可以被簡化。比起上述之目 錄方法,該等詢問器22與標籤1〇間在做溝通之際,其所轉 移之額外資料係最少。 上述標籤10之另一項優點在於,不同類型之標籤1〇,This paper size applies the Chinese National Standard (CNS) A4 specification (210X297 male 1 (2) The label 10 will determine whether it can store the object 32. If so, the object 32 will be stored, and there will be an approval message, Returns to the interrogator 22. The interrogator 22 does not;}; control how to store the object 32 in the tag ι〇, and the tag 10 does not return such information to the interrogator 22. If the tag 1 〇 The object 32 could not be stored, and a _failure message is expected and returned to the interrogator 22. The object 32 should preferably be coded for additional security and / or error detection and correction. This coding step may involve Add additional, extra bits of information that may or may not be stored in the tag memory 20 to the object 32. To read information from a tag 10, the following steps will be performed: (1) Interrogator 22 will issue a signal requesting the tag 10 to send a specific object. For example, this signal may require the tag 10 to send its date object (ie, the object has the identification code 1001). This signal may be sent continuously, or Will be sent once or a specific number of times. (2) If the tag 10 contains a data object, the tag 10 should preferably be able to send the entire object 32 mentioned above. Alternatively, the tag 10 can be sent to only Send the information block 34 and size field 38 of the above object 32 ^ If the tag 10 does not contain a data object, a failure message or other type of predetermined message will be returned to the interrogator 22. Or, and The occurrence of no tag sending action and the absence of this sending action will be interpreted by the interrogator 22 as meaning that there is no such object 32 on the tag 10. The reading process of the above step (1) The program can be followed by an interrogator control message to inquire whether a specific object 32 is stored on a standard. Printed by the Consumer Cooperatives of the Central Government Bureau of the Ministry of Economic Affairs A7 -----_ B7 V. Description of the invention (17 ) '~ If the reception is a positive response, its processing procedure will continue as described above. When an object 32 is read from a tag 10, their identification code 36 and size field 38, preferably before its information field 34 Take it out. This is because the size of the information block 34 is unknown before its size block 38 is decoded. Knowing the size of the information block 34 will help determine whether the information booth 34 is transmitted. It has already been completed. However, the parts of the object 32 can be sent in any order, as long as there is a method to correctly delimit the parts. Figures 6A and 6B show the use of the label in which the object is stored Schematic block diagram of the RFID system. In Figure 6A, a computer 42 can send some .control signals to the interrogator 22 and can receive RFm tag data from it. This computer 42 can approach the above when needed. Database Table 40. In Fig. 6B ', the database table 40 is incorporated in the interrogator 22. The use of these objects may allow the interrogator 22 to perform selective actions related to the request, and may allow the tag 10 to perform selective control functions related to execution in response to the above-mentioned request. The above interrogator request can be regarded as a control message. The control message includes an object identification code 36 and a control message of this kind is used to request the tag 10 to send an object 32 with a specific identification code 36. Another control message is used to request the tag 10, if it contains the requested object 32, it can make a positive response without actually transmitting the object. Another control function may be to clear the object 32 from the tag memory 20. If there is another control function, it may be to change the content of the information block 34 of a special object 32, so that it can indicate that the label's exact paper size is toward the A4 secret of Guanjia County (cns) (" 210X297). ~ '(Please read the precautions on the back before filling out this page) -Order-20-Printed by the Central Standards Bureau of the Ministry of Economic Affairs, Zhengong Consumer Cooperative Λ7 B7 V. Description of the invention (18) The ownership of the item has been transferred from the store To customers. There is another control function. It may be that the object 32 is stored in the above-mentioned tag memory 20, so that the memory of the tag 1G can be changed, so that the object 32 cannot be changed or removed.》 Other control systems It is within the scope of the present invention. As described above, storing data in a collection 10 has more advantages than the existing storage technology of the collection. Its main advantage is that the memory allocation strategy of the tag 10 is hidden from the interrogator 22. That is, the interrogator 22 does not know (need not to know) how the data is stored in the memory 20 of the tag 10 in communicating with the tag and performing a desired action relative to its tag data. The internal operation of its redundant label 18 can be hidden and separated from its information transfer operation. One benefit of this fact is that different tag applications do not have to change either its interrogator 22 or its agreement. This independence allows the designer to incorporate features into the IC 18 of the above tags without having to change the rest of the tape 0 system, or its interrogator / tag communication protocol. For example, data compression technology can be applied to the tag 1C 18 to reduce the number of bits of stored memory, so that its interrogator 22 does not even need to know that the data compression technology is being implemented. The data compression technology described above is particularly attractive when RFID tags are used in applications that need to store large amounts of data. The communication protocol between the above tags / interrogators can be simplified compared to those systems that use directory methods to manage data. Compared with the above-mentioned directory method, the interrogator 22 and the tag 10 communicate the least amount of additional information when communicating. Another advantage of the above label 10 is that different types of labels 10,

本紙張尺度適財S^iiTcNS ) Μ規210x297公釐The paper size is suitable for S ^ iiTcNS) M gauge 210x297 mm

經濟部中央標準局負工消費合作社印裝 A7 - ______B7五、發明説明(19 ) ~~ 〜·^ 可以使用相同之詢問器22。一特定標籤之具體實現,可將 該物件32管理成一鏈結列表。另一標籤之具體實現誠如 上文所述,可使用一目錄配置之記憶體。其使用何種方法 之選擇,將依其標籤記憶體20之希望成本和複雜性而定。 上述標籤10之又一項優點在於,該等具有不同應用之 不同標籤設計,可以使用相同之RFID系統。由於該標籤1〇 有其自已之物件記憶體管理程式,其資料之儲存可獨立於 上述之詢問器協定。舉例而言,參考第3和5圖,有一類標 籤10,可用於一零售食品店中,以便將食品上面之到期曰 資料’編碼進該資訊欄位34内。其標籤物件32,可具有一 1001之辨識碼3 6,以及可使用一鏈結列表之方法,來管理 , 該物件。另一類標籤1〇,則可用於一零售消費產品店中, 以便追蹤物品之擁有權。此標籤物件32,可具有一 1〇1〇之 辨識碼36,以及可使用一目錄方法,來管理該物件。縱然 彼#§己憶艘管理策略完全不同卻可使用相同之詢問.器 22,來與兩類型之標籤1〇做溝通。 或者’僅修改上述之詢問器協定.,其應用例完全不同 之標籤設計,卻可以相同,即使彼等標籤可能具有不同位 元長度之資訊攔位34和尺寸欄位38亦然。此外,僅要在兩 類標籤中使用相同之辨識碼36,完全不同之標藏設計,便 可供相同之應用例使用。此適應性可降低開發不同應用例 中所用標戴之生產線的成本’以及亦可確保新設計之標 I 籤,能與現有之RFID系統相容。相形之下,該等使用一 固疋δ己憶艘配置桌略’儲存在該等標藏之記憶體内的資 本紙張尺度適用中國國家梂準(CNS ) A4規格(2丨OX297公釐) f請先聞讀背面之k意事項再填寫本頁) • IT— n «Lr . -裝. 、ar- -22- 經濟部中央標準局貝工消費合作社印製 A7 B7 五、發明説明(20) 料,卻必須在一預定之方式下做安排,以便能與其他之 rfID系統相容。在-固定之策略中,其標藏或應用例中 之任何改變,均可能須要耗費鉅資來改變其RFID系統之 其他部分。 右有需要,其尺寸攔位3 8可用來管理其用以儲存物件 32之標籤s己憶艎20的配置,藉以使其有限記憶體空間之利 用為最大。一 16位元之資訊欄位34,如第4圖中所示,僅 須要佔有16位元之記憶體空間。相形之下,一傳統式固定 記憶體配置之策略,即使在其資料需要少量之空間,亦要 指定固定大小之區塊給資料。由於上述固定大小之區塊, 必須被選擇用來容納最大期望之資料字串,只要其資料字 ,串小於上述最大容許之字串,其記憶體空間便屬浪費。上 述標蕺10之又一項優點在於,該標籤1〇上面所儲存之資 訊,可合理地加以隱藏,而不必仰賴加密之技術。加密技 術所費不貲’且會增加交易處理之時間。 考慮上述資訊攔位34為販賣日期之下列情況β若一物 未售出其中便沒有販賣之曰期,‘以及其資訊攔位34將 具有表示該事實之内容值(例如,〇〇/〇〇/〇〇)。當一物品 合法售出,一販賣日期便會被置於其資訊欄位34内。該詢 問器22,唯有在一加標籤之物品,在該詢問區域内被偵測 到,其未具有販賣曰期,或其具有一不同於當天曰期之販 賣曰期時,方會觸動警鈴。 —慣竊會想得到一經合法售出物品之RF丨D標籤上面 所儲存之資訊。由於該物品已合法售出,其資訊棚位观 本紙張认適㈤叫八4規格⑺…撕公楚 --- 1—------------1 _‘ .裝__ (請先閲讀背面之k意事項再填霜本頁) 訂 -23- 經濟部中央標準局員工消費合作社印袋 A7 B7五、發明説明(21 ) 時將包含一表示實際販賣日期之信息資訊。若該竊賊發現 到如何獲知該資訊攔位34之内容,該竊賊便有可能重新程 式化一尚未售出之物品(其仍在該商店内)的標籤10,而使 其資訊欄位34表示一販賣曰期。該竊賊可能接著會帶著該 物品,步行通過該詢問器22並離開該商店,而不會觸動警 鈴。在本系統中,該竊賊必須首先發現有關販賣日期之辨 識碼36。一辨識碼36可能是一24位元之字串。由於該竊賊 最初無法知道該辨識碼36為何,該竊賊將必須嘗試讀取該 標籤10内部之所有可能之物件,以及在將彼等讀取出後, 試著推論出何者係具有販賣日期之資訊。要如此做,該竊 賊便會要求其具有辨識碼〇〇〇〇〇〇〇〇〇〇〇〇〇〇〇〇〇〇〇〇〇〇〇〇之物 , 件32(就其而言,可能是或可能不是一物件32)、接著是 000000000000000000000001、接著是000000000000000000 000010、接著是000000000000000000000011、接著是0000 00000000000000000100等等,直至該竊賊已要求過其具有 高至111111111111111111111111之辨識碼36的所有物件為 止。在循環過所有之辨識碼36後,該·竊賊將會發現到有某 些物件,甚至可能只有一個物件。此際,該竊賊將十分容 易地演繹出,何者物件32將包含販賣日期之資訊。然而, 由於一辨識碼36内有24個位元,該竊賊勢必要讀取224個 不同物件,或者67,108,864個不同物件,以便到達此一地 步。 1 姑假設讀取每一物件32(或找出所要求之物件並不存 在)會耗去10毫秒,該竊賊可每秒試圖讀取100個物件。以 (請先閲讀背面之J意事項再填寫本頁) 裝.Printed by the Consumer Standards Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs A7-______B7 V. Description of Invention (19) ~~ ~ · ^ The same interrogator 22 can be used. The specific implementation of a particular tag may manage the object 32 into a linked list. The specific implementation of the other tag is as described above, and a directory configuration memory can be used. The choice of which method it uses will depend on the desired cost and complexity of its tag memory 20. Another advantage of the above-mentioned tag 10 is that these different tag designs with different applications can use the same RFID system. Since the tag 10 has its own object memory management program, its data can be stored independently of the interrogator protocol described above. For example, referring to Figures 3 and 5, there is a type of label 10 that can be used in a retail food store to encode the expiration date information 'on the food into the information field 34. The label object 32 may have an identification code 3 100 of 1001, and a link list method may be used to manage the object. Another type of tag 10 can be used in a retail consumer product store to track ownership of an item. The label object 32 may have an identification code 36 of 1010, and a catalog method may be used to manage the object. Even though the ## has recalled that the management strategy is completely different, the same query device 22 can be used to communicate with the two types of tags 10. Or 'only modify the above-mentioned interrogator agreement. Its application examples are completely different in label design, but they can be the same, even if their labels may have information block 34 and size field 38 of different bit lengths. In addition, it is only necessary to use the same identification code 36 in two types of labels, and the completely different label designs can be used for the same application. This adaptability can reduce the cost of developing the production line of the label used in different application examples, and also ensure that the newly designed label I is compatible with the existing RFID system. In contrast, the size of the capital paper sheets stored in the memory of these collections using a solid δ-Yiyi ship configuration table is applicable to the Chinese National Standard (CNS) A4 specification (2 丨 OX297 mm) f Please read the meanings on the back before filling out this page) • IT— n «Lr. -Pack., Ar -22- Printed by A7 B7, Shellfish Consumer Cooperative, Central Bureau of Standards, Ministry of Economic Affairs 5. Description of Invention (20) Materials, but must be arranged in a predetermined way in order to be compatible with other rfID systems. In the fixed strategy, any change in its labeling or application case may require huge expenditures to change other parts of its RFID system. On the right, the size stop 3 8 can be used to manage the configuration of the tag s and memory 20 used to store the object 32, so as to maximize the use of its limited memory space. A 16-bit information field 34, as shown in Figure 4, requires only 16-bit memory space. In contrast, a traditional fixed-memory configuration strategy requires a fixed-size block to be assigned to the data even if the data requires a small amount of space. Due to the above-mentioned fixed-size block, it must be selected to accommodate the maximum expected data string. As long as the data string is smaller than the above-mentioned maximum allowed string, its memory space is wasted. Another advantage of the above-mentioned tag 10 is that the information stored on the tag 10 can be reasonably hidden without relying on encryption technology. Encryption technology is expensive and will increase transaction processing time. Consider the following case where the above information block 34 is the date of sale. Β If an item is not sold, there is no date for the sale, and its information block 34 will have a content value indicating that fact (for example, 〇〇 / 〇〇 / 〇〇). When an item is legally sold, a sale date is placed in its information field 34. The interrogator 22 can only trigger an alarm when an item with a label is detected in the inquiry area, and it does not have a sales date, or it has a sales date different from the current date. bell. —The habitual thief would like to obtain the information stored on the RF 丨 D label of a legally sold item. Since this item has been legally sold, the information booth is suitable for viewing this paper. It is called the 8-4 size .... Tear the Gongchu --- 1 ------------- 1 _ '. 装 _ _ (Please read the notices on the back before filling this page) Order-23- Printed bags for consumer cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs A7 B7 V. Invention description (21) will include information indicating the actual sales date . If the thief finds out how to know the contents of the information block 34, the thief may reprogram the label 10 of an unsold item (which is still in the store), so that the information field 34 indicates a Selling dates. The thief may then take the item, walk through the interrogator 22 and leave the store without triggering the alarm. In this system, the thief must first find the ID 36 of the date of sale. An identification code 36 may be a 24-bit string. Since the thief could not initially know what the identification code 36 was, the thief would have to try to read all possible objects inside the tag 10 and, after reading them out, try to deduce which information has the date of sale . To do so, the thief would ask him for something with an identification code of 20,000,000,000,000,000,000,000,000,000,000, piece 32 (for its part, it could be Or maybe it's not an object 32), then 000000000000000000000001, then 000000000000000000 000010, then 000000000000000000000011, then 0000 00000000000000000100, etc., until the thief has requested all objects with an identification code 36 as high as 111111111111111111111111111. After looping through all the identification codes 36, the thief will find that there are certain objects, maybe even only one. At this point, the thief would easily interpret which object 32 would contain information on the date of sale. However, since there are 24 bits in an identification code 36, the thief must read 224 different objects, or 67,108,864 different objects, in order to reach this point. 1 Assuming that reading each object 32 (or finding out that the requested object does not exist) would take 10 milliseconds, the thief could try to read 100 objects per second. (Please read the J notice on the back before filling this page).

-IT-IT

•V 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐) -24- A7 B7 經濟部中央樣準局貝工消費合作社印装 五、發明説明(22 ) 此一速率,要讀取該標籤内所有可能之物件,將會耗去 671,089秒,其將等於186小時或7.77天。 為抑止該物件資訊被發現,該商店可能會採取週期性 改變該辨識碼36之策略。一星期其可能是1〇111〇〇1〇1〇〇〇1 ouoiiioio。次一星期其可能是01011〇1〇111〇1〇〇ιι〇ι〇ιι 〇1。若該商店以星期為單位,就販賣日期來改變該辨識碼 36,其碼之改變將較其被一竊賊發現為快速。舉例而言, 若該辨識碼36為一 32位元之數字,以及該竊賊每秒可讀取 多至1000個物件,其要讀取所有之資料,則仍要做4百萬 次嘗試’而費去其一個多月以上之時間。 藉著不時改變其辨識碼36,該等標籤1〇可受到檢查, 以確保其辨識碼36能與適當之販賣日期相匹配。舉例而 吕,一10111〇〇1〇1〇〇〇1〇11〇111〇1〇之辨識碼36,可能與自 12/15/96至12/22/96之販賣日期相關聯,而〇1〇11〇1〇111〇 100110101101 之辨識碼36,則可能與自 12/23/96至12/3〇/96 之販賣曰期相關聯。即使一竊賊已發現到一特定之辨識碼 36,加上其販賣曰期解碼有關之編碼.策略,該竊賊仍將需 要知道何者日期適合該特定之辨識碼36。若該竊賊以一不 在該特定辨識碼36相關範圍内之日期,來對一標籤1〇做程 式化,則在一商店詢問器處,便會觸動警鈐。若該竊賊以 一在正確範圍内之曰期,對一標籤1〇做程式化,但其不是 當天日期,上述RFID系統可選擇地加以程式化,俾能觸 動警鈴以警告商店人員,上述加標籤之物品,或為一先前 售出之物品(例如,一要退回之物品),或為一被非法做 ----------------'-裝------訂------V (請先閲讀背面之.;項再填寫本頁) -25- 經濟部中央標準局員工消費合作社印製 Λ7 --- B7 五、發明説明(23 ) 「 ---- 式化或加標籤之物品。商店人員將必須做進一步之調查, 以決定所存在係何種之情節。 為進一步使物件之被發現受阻,該資訊棚位34之格 式,亦可改變為一時間之函數。 為進-步防止標籤10上面之資訊被發現及遭到據改, 該標籤10上面之物件32,可鏈結至該標籤10上面之另一物 件。 考慮一零售商店環境中彼等物品上面所用、一組標籤 10之每一標籤上面所儲存之兩物件32丨和32〗的情況。其第 一物件32丨係如上文所述,為販賣曰期。此販賣曰期可用 以決定,該物品是否實際售出或該加標籤之物品的保證期 , 疋否仍然有效。其第二物件32z係其最後實地盤存之日期。 商店會做經常性之盤存檢查,例如每週一次,以及以每次 盤存檢查之最近日期’更新該物件322。當一物品售出時, 其販賣日期會記錄在物件32,内.。就每一售出物品而言., 該等物件32,内之日期與物件322内之曰期間,將會有一預 定之關係。在每週做一次盤存檢查之範例中,以上兩曰期 應該絕對不會相差7天以上。 茲假設一慣竊已發現到如何捏造上述之第一物件 32丨。該竊賊此時將能插進販賣日期,以使一未售出之物 品,呈現為已被售出(誠如前文所述,自商店扒走該物品), 或使一久已售出之物品,呈現為最近售出(以使一破損之 t 物品在一保證期内,或將一已過退還期限之物品退還)。 然而,該義賊未必有察覺到,該第一物件32丨必須受到一 本紙張尺度適用中國國家橾準(CNS ) A4規格(210X297公嫠) . ^----r--广、裳------訂-------k (請先閱讀背面之^意事項再填寫本頁) -26- 經濟部中央揉準局負工消費合作社印製 A7 __:___________B7_ 五、發明説明(24 ) ~~ 第二物件32s之支持,以避免觸動一警鈴或將一矛盾警告 該商店。因此,該竊賊巧妙處置該第一物件321之方式, 可能不會與該第二物件3 2 2和其間所存之佐證性相調和。 舉例而言,該竊賊可能更改了第一物件32,,而使一物品 在2/15/96實際售出之曰期,此時讀取為2/15/97,卻未察 覺到其最後實地盤存之曰期’亦儲存在該標籤1〇上面,並 且讀取為2/13/96。由於該等實際售出曰期與最後盤存檢 查曰期間之時間,應永遠為七天或以内,以及上述要退回 之物品,顯示一多於一年之日期差,該商店便知道該標鐵 1〇可能已遭到攛改》物件之鏈結關係,故可用以使甚至彼 等可能知曉如何讀取及更改該選定物件32之慣竊或内部人 . 員的努力受阻。 第7圖係一可偵測一具有兩個或多個鏈結物件32之標 籤10是否已遭到攛改’其基本處理程序的流程圖❶該等兩 個或多個物件32,係自一標籤10被讀取出(步驟100)。其 次,取出一可界定該等多數物件32間之鏈結關係的資料(步 驟200)。此資料可能係儲存在一詢問.器、一外在電腦、或 該標籤10本身内。其次,該鏈結關將會受到檢查,看看其 是否仍然完整無損(步驟300)。若不是,便顯示一警鈴狀 況’以及商店人員將對該事件之詳情做調査(步驟4〇〇)。 此處理程序之具體實現,係使用該詢問器内之一比較器或 商店内之電腦,而自一記憶體位置取出彼等鏈結關係或佐 證關係之資料》該比較器會檢查該等鏈結物件32之資訊欄 位34 ’其間是否存在有適當之關係。物件鏈結之其他具體 本紙張尺度適用巾S @ CNS )八4祕(210X297公楚) L » ^ 裝 訂 '..Λ (請先閲讀背面之}i意事項再填窍本頁) -27- A7 '〜___ __B7 五、發明説明(25 ) , '— 實現,係在本發明之範圍内β 誠如上文所述,該保安標籤1〇係與該等呈物品形式之 預定項目相關聯,以及該等標籤1〇係直接附著在各物品或 各物品之包裝上面。本發明之此一實施例,可供一 rfid 系統使用。或者,本發明可用於他類使用保安標籤1〇之系 統中。某些實例包括:一圖書館結帳系統,其係具有加標 籤之圖書館物品;一人員識別系統,其中人員係配戴有加 標籤之配章,以及可依據彼等配章内所儲存之資訊,得到 所選定區域之進出權;和一行李管理系統,其中之行李係 各自加有標蕺。 熟於本技藝者不難理解的是,在不違離本發明之廣意 . 觀念下,以上諸實施例將可做一些改變。故理應瞭解的是, 本發明並非僅限於所揭示之特定實施例,而係欲涵蓋本發 明在其所附申請專利範圍所界定之精神和範圍内的修飾 體。 . ί ΊIT--------- (請先閲讀背面之Ji$項存填寫本κ) 經濟部中央標準局員工消費合作社印製 本紙張尺度適用中國國家梯準(CNS ) A4規格(210X297公釐) -28- 經濟部中央標準局員工消費合作社印製 Λ7 B7 五、發明説明(26 ) 元件標號對照 10...保安標籤 28...天線組體 12...被動式共振射頻(RF)電路 30...資料處理和控制電路 14...線圈天線 32...物件 16...電容器 34...資訊欄位 18...積體電路(1C) 36...辨識碼 20...可程序化記憶體 38...尺寸欄位 22...詢問器 39...資訊攔位結束碼 24...發送器 42...電腦 26...接收器 L ^ 裝 訂 /L, (請先閲讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐)• V This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) -24- A7 B7 Printed by the Bayer Consumer Cooperative of the Central Sample Bureau of the Ministry of Economic Affairs 5. Description of the invention (22) Reading all possible objects in the tag will take 671,089 seconds, which will equal 186 hours or 7.77 days. In order to prevent the object information from being found, the store may adopt a strategy of periodically changing the identification code 36. In a week it may be 10,111,001,001,001 ouoiiioio. The next week it may be 010110101011110010011. If the store is on a weekly basis, the identification code 36 is changed based on the date of sale, and the change of the code 36 will be faster than it would be discovered by a thief. For example, if the identification code 36 is a 32-bit number, and the thief can read up to 1,000 objects per second, if he wants to read all the data, he still has to make 4 million attempts. It costs more than one month. By changing their identification code 36 from time to time, these tags 10 can be inspected to ensure that their identification code 36 matches the appropriate sale date. For example, Lu, a 10111001001001001111111111 identification code 36, may be associated with the date of sale from 12/15/96 to 12/22/96, and 〇1 〇11〇1〇111〇100110101101 identification code 36, may be associated with the sales date from 12/23/96 to 12/30/96. Even if a thief has found a particular identification code 36, plus its selling date-related decoding strategy, the thief will still need to know which date is suitable for that particular identification code 36. If the thief programs a tag 10 with a date that is not within the relevant range of the particular identification code 36, an alert will be triggered at a store interrogator. If the thief programs a tag 10 with a date within the correct range, but it is not the date of the day, the RFID system described above can optionally be programmed to trigger an alarm to warn store personnel. The labelled item is either a previously sold item (for example, an item to be returned), or an item that was illegally made ----------------'- packed --- --- Order ------ V (Please read the .. on the back; fill in this page first) -25- Printed by the Staff Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs Λ7 --- B7 V. Description of Invention (23) "---- Stylized or tagged items. Store staff will have to conduct further investigations to determine what kind of plot exists. To further hinder the discovery of the items, the format of the information booth 34 also Can be changed as a function of time. To further prevent the information on the label 10 from being found and modified, the object 32 on the label 10 can be linked to another object on the label 10. Consider a zero Two objects 32 丨 and 32 stored on each of a set of tags 10 used in their store environment The first item 32 is the date of sale as described above. This date of sale can be used to determine whether the item is actually sold or the warranty period of the tagged item, whether it is still valid. The second item 32z is the date of its last physical inventory. The store will make regular inventory checks, such as once a week, and update the item 322 with the latest date of each inventory check. When an item is sold, it is sold The date will be recorded in the item 32, ... For each item sold, there will be a predetermined relationship between the date in the item 32, and the period in the item 322. Inventory inspection will be done once a week In the example, the above two dates should never differ by more than 7 days. It is assumed that a thief has discovered how to fabricate the above-mentioned first object 32 丨. The thief will now be able to insert the selling date so that Items sold are presented as sold (as previously described, the item was plucked from the store), or items that have been sold for a long time are presented as recently sold (so that a damaged item During the guarantee period, either Items returned after the refund period). However, the righteous thief may not be aware that the first article 32 丨 must be subject to a paper size applicable to the Chinese National Standard (CNS) A4 specification (210X297). ^ ---- r--Guang, Sang ------ Order ------- k (Please read the ^ Matters on the back before filling out this page) -26- Printed by the Central Consumer Bureau of the Ministry of Economic Affairs A7 __: ___________B7_ V. Description of the Invention (24) ~~ Support of the second object 32s to avoid triggering an alarm bell or warning the shop of a contradiction. Therefore, the way the thief handled the first object 321 cleverly may not It will reconcile with the second object 3 2 2 and the corroborative evidence stored in it. For example, the thief may have changed the first item 32, so that an item was actually sold on the date of 2/15/96, which reads 2/15/97, but did not notice its final field The inventory date is also stored on the tag 10 and read as 2/13/96. Since the actual sales date and the period of the last inventory check should always be seven days or less, and the items to be returned above show a date difference of more than one year, the store knows the bidding iron1. May have been altered "the link relationship of the object, so it can be used so that even they may know how to read and modify the selected object 32 by the theft or insiders. FIG. 7 is a flowchart that can detect whether a label 10 having two or more linked objects 32 has been modified, and its basic processing procedure. The two or more objects 32 are from one The tag 10 is read out (step 100). Next, a piece of data defining the link relationship between the plurality of objects 32 is retrieved (step 200). This information may be stored in an interrogator, an external computer, or the tag 10 itself. Second, the link will be checked to see if it is still intact (step 300). If not, an alarm condition is displayed 'and the store staff will investigate the details of the incident (step 400). The specific implementation of this processing procedure is to use a comparator in the interrogator or a computer in the store, and retrieve the information of their link relationship or corroboration relationship from a memory location. The comparator will check the links Information field 34 'of object 32' is there a proper relationship between them. Other details of the object link This paper size is applicable to towel S @ CNS) Secret 4 (210X297) Chu L »^ Binding '.. Λ (Please read the} on the back of the page before filling in this page) -27- A7 '~ ___ __B7 V. Description of the invention (25),' —Achievement is within the scope of the present invention β As stated above, the security tag 10 is associated with such predetermined items in the form of articles, and The labels 10 are directly attached to each item or the packaging of each item. This embodiment of the present invention can be used by an RFID system. Alternatively, the present invention can be used in other systems using the security tag 10. Some examples include: a library checkout system with tagged library items; a personnel identification system in which people wear tagged badges, and can be stored based on their badges Information to obtain access to selected areas; and a baggage management system, in which baggage is individually labeled. It is not difficult for those skilled in the art to understand that, without departing from the concept of the present invention, the above embodiments may be modified. Therefore, it should be understood that the present invention is not limited to the specific embodiments disclosed, but is intended to cover modifications of the present invention within the spirit and scope defined by the scope of the patents attached to it. ί ΊIT --------- (Please read the Ji $ entry on the back and fill in this book first) The paper size printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs applies to the Chinese National Standard (CNS) A4 specification ( 210X297 mm) -28- Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs Λ7 B7 V. Description of the invention (26) Component label comparison 10 ... Security label 28 ... Antenna group 12 ... Passive resonance radio frequency ( RF) circuit 30 ... data processing and control circuit 14 ... coil antenna 32 ... object 16 ... capacitor 34 ... information field 18 ... integrated circuit (1C) 36 ... identification Code 20 ... programmable memory 38 ... size field 22 ... interrogator 39 ... information block end code 24 ... transmitter 42 ... computer 26 ... receiver L ^ Binding / L, (Please read the notes on the back before filling out this page) This paper size applies to China National Standard (CNS) A4 (210X297 mm)

Claims (1)

A8 B8 C8 D8 經濟部中央梯準局貝工消費合作社印裂 六、申請專利範圍 1. 一種可供射頻辨識(RFID)標籤所用之記憶體此記憶 體内含一個或多個物件,各物件包含: (0—内含有關物品之信息資訊的資訊攔位; (11) 一可表示該資訊欄位内其信息資訊之類型的辨 識碼;和 (m)—可表示該資訊欄位内其信息資訊之尺寸的 尺寸攔位。 2. —種供與物品相聯結之保安標籤,此保安標籤内含_ 積體電路,其具有一記憶體,此記憶體可儲存一個或 多個物件,以及可於一選定之詢問信號,詢問該保安 才示籤之際’輸出一個或多個物件,而做為一嚮應之信 说’各物件包含: (I) 一内含有關物品之信息資訊的資訊欄位; (II) 一可表示該資訊欄位内其信息資訊之類型的辨 識碼;和 (ιι〇 —可表示該資訊欄位内其信息資訊之尺寸的 尺寸攔位。 3_ —種與物品相聯結並附著其上之保安標籤,此保安標 藏包含: (a) —共振電路,其可用以接收一詢問信號,以及 傳回一嚮應信號,來偵測該物品之存在與否,以及 (b) —與該共振電路相連接之積體電路,此積體電 路具有一記憶體,此記憶體可儲存一個或多個物件, 以及可於一選定之詢問信號,對該保安標籤做詢問之 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閲讀背面之注項再填寫本頁) -裳- -訂- -30- A8 B8 C8 D8 申請專利範圍 而做為一嚮應之信號,各 際,輸出-個或多個物件, 物件包含: (:卜内含有關物品之信息資訊的資訊欄位; (U)-可表示該資訊攔位内其信息資訊之類型的辨 識碼;和 該資訊欄位内其信息資訊之尺寸的 II ιί—^.-- (請先聞讀背面之注f項再填寫本頁) (iii)—可表示 尺寸攔位。 4· 一種監視系統,其包含: (a)—與一物品相關聯並附著其上之保安標藏此 保女標藏包含: ⑴一共振電路,其可用以接收一詢問信號,以及 傳回冑應k號’來憤測該物品之存在與否,以及 經濟部中央標準局貝工消費合作社印装 (Η)—與該共振電路相連接之積體電路,其具有一 記憶體,此記憶體可儲存一個或多個資訊區塊,以及 可於一選定之詢問信號,詢問該保安標籤之際,輸出 一個或多個資訊區塊’各資訊區塊包含:有關該物品 之信息資訊、一可表示該資訊區堍内其信息資訊之類 型的辨識碼、和一可表示該信息資訊之尺寸的尺寸碼 (b)—詢問器,其可輸出上述選定之詢問信號,以 及可接收上述之嚮應信號; (e)—與該詢問器相連接之電腦,其可指示該詢問 器輸出一選定之詢問信號,以及可解析上述之嚮應信 號,此電腦可接近該等辨識碼和各類信息資訊的列表 本紙張尺度適用中國國家揉準(CNS ) Α4規格(210X297公釐) -31-A8 B8 C8 D8 Printed by the Central Laboratories of the Ministry of Economic Affairs, Shellfish Consumer Cooperatives 6. Scope of Patent Application 1. A kind of memory for radio frequency identification (RFID) tags This memory contains one or more objects, each object contains : (0—information block containing information about the item; (11) an identification code that can indicate the type of information in the information field; and (m) —can indicate its information in the information field The size of the information is blocked. 2. —A security tag for connecting with the article. This security tag contains a _ integrated circuit, which has a memory. This memory can store one or more objects, and can At the time of a selected interrogation signal asking the security guard to sign, 'output one or more objects, and as a consistent letter said that each object contains: (I) an information containing information about the article Field; (II) an identification code that can indicate the type of information information in the information field; and (ιι〇—size block that can indicate the size of its information information in the information field. 3_ — species and articles Connected and attached The security label on it includes: (a) a resonance circuit that can be used to receive an interrogation signal and return a response signal to detect the existence of the item, and (b)- An integrated circuit connected to the resonance circuit, the integrated circuit has a memory, the memory can store one or more objects, and the paper size of the security tag can be queried on a selected interrogation signal Applicable to China National Standard (CNS) A4 specification (210X297mm) (Please read the note on the back before filling this page) -Shang- -Order- -30- A8 B8 C8 D8 Signal, field, output-one or more objects, the objects include: (: information field containing information information about the item; (U)-an identification code that can indicate the type of information information in the information block ; And the size of the information in the information field II ι — ^ .-- (please read the note f on the back before filling out this page) (iii) —can indicate the size stop. 4 · A surveillance system , Which includes: (a) —associated with an item The security label attached to it includes: ⑴ a resonant circuit that can be used to receive an inquiry signal and return the 胄 ying k 'to test the existence of the item, and the central government of the Ministry of Economic Affairs Printed by Standard Bureau Shellfish Consumer Cooperative (Η) —Integrated circuit connected to the resonant circuit, which has a memory, which can store one or more information blocks, and a selected inquiry signal , When asked about the security label, output one or more information blocks. Each information block contains: information about the item, an identification code that can indicate the type of information information in the information area, and an A size code indicating the size of the information (b)-an interrogator that can output the selected interrogation signal and can receive the above-mentioned response signal; (e)-a computer connected to the interrogator that can indicate The interrogator outputs a selected interrogation signal and can interpret the above-mentioned response signals. This computer can access the list of such identification codes and various types of information. This paper is applicable to Chinese standards. CNS) Α4 size (210X297 mm) -31- 3936S0 中請專利範圍 ο 5.如申請專利範圍第4項所申請之監視系統,其中,該記 憶逋將可儲存兩個資訊區塊,以及該電腦尚包含:_ 記憶體,其可儲存一些代表上述兩資訊區塊間之_預 期關係的資料;可一比較器,其可比較上述兩資訊區 塊’以決定上述預期之關係是否存在。 • 種可在一監視系統之詢問器與一物品所關聯之保安 標籤間進行溝通的方法,該保安標籤包含一積體電路 ’其具有一可儲存一個或多個物件之記憶體,各物件 包含:一内含有關物品之信息資訊的資訊攔位、一可 表示該資訊攔位内其信息資訊之類型的辨識碼、和一 可表示該資訊欄位内其信息資訊之尺寸的尺寸攔位, 上述方法所包含之步驟有: (a) 自該詢問器發送一請求信號,此請求信號含有 一物件辨識碼; (b) 接收一保安標籤内之請求信號; 經濟部中夬棣隼局負工消費合作社印裝 n H I ϋ I n n LfY ^ n I (請先閲讀背面之注意事項再填寫本頁) (c) 搜尋上述之保安標籤記憶體,以決定其中是否 存有所請求之物件;以及 (d) 右所請求之物件係儲存在該保安標籤記憶體内 則至〆發送上述所請求物件之資訊攔位和尺寸欄位 〇 勺:明專利圍第6項所中請之方法,其中之步驟⑷ 3右所明求之物件係儲存在該保安標籤内則發 送整個所請求之物件。Patent scope in 3936S0. 5. As the monitoring system applied for in the patent application scope item 4, the memory 逋 will be able to store two information blocks, and the computer also contains: _ memory, which can store some representatives Data on the expected relationship between the two information blocks; a comparator that compares the two information blocks to determine whether the expected relationship exists. • A method for communicating between an interrogator of a surveillance system and a security tag associated with an article, the security tag includes an integrated circuit 'which has a memory that can store one or more objects, each object contains : An information block that contains information about the item, an identification code that can indicate the type of its information in the information block, and a size block that can indicate the size of its information in the information field, The steps included in the above method are: (a) sending a request signal from the interrogator, the request signal containing an object identification code; (b) receiving a request signal in a security tag; Consumer cooperatives printed n HI ϋ I nn LfY ^ n I (Please read the precautions on the back before filling out this page) (c) Search the above security tag memory to determine whether the requested items are stored in it; and ( d) The requested object is stored in the memory of the security tag, and then the information block and size field of the requested object are sent. Scoop: It is requested in Ming Patent No. 6 Method, wherein the step of seeking out the right ⑷ 3 stored in the object-based security tag is requested to send the entire object. -32--32- S93630申請專利範圍 8 888 ABCD 種可在一監視系統之詢問器與一物品所關聯之保安 私籤間進行互動的協定方法,該保安標籤包含一積體 電路,其具有一可儲存一個或多個物件之記憔體,各 物件包3 . —内含有關所關聯物品之信息資訊的資訊 , 了表示該資訊攔位内其信息資訊之類型的辨 識碼、和—可表示該資訊欄位内其信息資訊之尺寸的 尺寸欄位,上述方法所包含之步驟有: ⑷自該詢問器發送-控制訊息,此控制訊息含有 一物件辨識碼; (b)接收一保安標籤内之控制訊息; ⑷搜尋上述之保安標籤,以決^該保安標藏内是 否存有上述物件辨識碼所屬之物件;以及 ⑷若該物件係儲存在該保安«内,則執行-控 制機能。 9.=Γ圍第8項所申請之方法,其中之控制機能 係供上述之保安標载,心發送該物件。 -如^專利範圍第8項所申請之方·法,其中之控制機能 係自上述保安標籤記憶趙清除該物件。 a如==第,請之方法,其中之控._ 清=更改上述保文標藏之記憶體,期使該物件無法被 l2.==項所〜法,之控制機能 保安標籤之—存物件之資 本紙張GiiTi國家梯準(CNS)S93630 patent application scope 8 888 ABCD An agreement method for interacting between an interrogator of a surveillance system and a security private label associated with an item. The security label includes an integrated circuit that has a storage capacity of one or more The body of the object, each object package 3. — Contains information about the information of the associated item, an identification code indicating the type of information information in the information block, and — can indicate the information in the information field The size field of the size of the information. The above method includes the following steps: 发送 Send a control message from the interrogator, the control message contains an object identification code; (b) receive the control message in a security tag; ⑷ search The security label mentioned above is used to determine whether the object belonging to the above object identification code is stored in the security label; and if the object is stored in the security «, the execution-control function is executed. 9. = The method applied for item 8 in Γ, where the control function is for security labeling mentioned above, and the object is sent by heart. -The method and method as applied for in item 8 of the patent scope, wherein the control function is to clear the object from the memory of the security label mentioned above. a If == No., please control the method. _ Clear = Change the memory of the above-mentioned Baowen label, in order to prevent the object from being controlled by l2. == Item, method, and security label of the control function—store Articles of capital paper GiiTi national ladder (CNS)
TW087111348A 1997-07-24 1998-07-13 Protocol for storage and retrieval of data in an RFID tag which uses objects TW393630B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US89953097A 1997-07-24 1997-07-24

Publications (1)

Publication Number Publication Date
TW393630B true TW393630B (en) 2000-06-11

Family

ID=25411151

Family Applications (1)

Application Number Title Priority Date Filing Date
TW087111348A TW393630B (en) 1997-07-24 1998-07-13 Protocol for storage and retrieval of data in an RFID tag which uses objects

Country Status (3)

Country Link
AU (1) AU8403698A (en)
TW (1) TW393630B (en)
WO (1) WO1999005659A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7386275B2 (en) 2005-03-11 2008-06-10 Dell Products Llp Systems and methods for managing out-of-band device connection

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7259654B2 (en) 2000-02-28 2007-08-21 Magellan Technology Pty Limited Radio frequency identification transponder
GB2362070B (en) 2000-05-05 2004-06-16 Nokia Mobile Phones Ltd Communication devices and method of communication
US20020183882A1 (en) 2000-10-20 2002-12-05 Michael Dearing RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
USRE47599E1 (en) 2000-10-20 2019-09-10 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US7426479B2 (en) 2002-03-12 2008-09-16 Ncr Corporation Customer activity data system and method
US7383864B2 (en) 2002-04-03 2008-06-10 3M Innovative Properties Company Radio-frequency identification tag and tape applicator, radio-frequency identification tag applicator, and methods of applying radio-frequency identification tags
CN100530226C (en) 2003-07-22 2009-08-19 诺基亚公司 Reader device for radio frequency identification transponder with transponder functionality
US7388488B2 (en) * 2003-10-30 2008-06-17 Peter Lupoli Method and system for storing, retrieving, and managing data for tags
ATE428994T1 (en) 2004-03-19 2009-05-15 Nokia Corp DETECTOR LOGIC AND RADIO IDENTIFICATION DEVICE AND METHOD FOR IMPROVING TERMINAL OPERATION
KR101153927B1 (en) * 2004-08-13 2012-06-08 텔레콤 이탈리아 소시에떼 퍼 아찌오니 Method of and system for secure management of data stored on electronic tags
US10062025B2 (en) 2012-03-09 2018-08-28 Neology, Inc. Switchable RFID tag
CN111524310B (en) 2019-02-01 2022-05-10 关卡系统股份有限公司 Intelligent alarm management

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4713753A (en) * 1985-02-21 1987-12-15 Honeywell Inc. Secure data processing system architecture with format control
US5113344A (en) * 1990-07-27 1992-05-12 Raymond Corporation Material handling vehicle identification tag
US5469363A (en) * 1994-05-19 1995-11-21 Saliga; Thomas V. Electronic tag with source certification capability
US5745036A (en) * 1996-09-12 1998-04-28 Checkpoint Systems, Inc. Electronic article security system for store which uses intelligent security tags and transaction data

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7386275B2 (en) 2005-03-11 2008-06-10 Dell Products Llp Systems and methods for managing out-of-band device connection
US7715795B2 (en) 2005-03-11 2010-05-11 Dell Products L.P. Systems and methods for managing out-of-band device connection

Also Published As

Publication number Publication date
AU8403698A (en) 1999-02-16
WO1999005659A1 (en) 1999-02-04

Similar Documents

Publication Publication Date Title
US7000834B2 (en) Method to address security and privacy issue of the use of RFID systems to track consumer products
JP4100867B2 (en) Electronic security system and method for using a predetermined set of passive radio frequency identification tags in an electronic security system
US10497237B2 (en) Security tag for inventory and anti-theft alarm system
US8432257B2 (en) Merchandise-integral transaction receipt and auditable product ownership trail
US20070109103A1 (en) Commercial product activation and monitoring using radio frequency identification (RFID) technology
TW393630B (en) Protocol for storage and retrieval of data in an RFID tag which uses objects
CN100416602C (en) Method and system for determining identifier for objects
EP2759975B1 (en) Tag system, sellable item and method for facilitating the purchase of a sellable item
US20060044111A1 (en) Real-time data reporting using radio frequency identification
US20130169413A1 (en) Method and system for detecting an item being removed from an establishment without authorization using radio frequency identification
KR20000036086A (en) Electronic article security system for store which uses intelligent security tags and transaction data
EP2575112B1 (en) Inventory and anti-theft alarm system
CN101685503B (en) Method and system for inquiring product information
US7649460B2 (en) Clip chip
CN102693440A (en) Electronized dormitory antitheft system base on RFID
JP2005196290A (en) Method for setting product number in rom-type rfid chip and method, apparatus and system for managing product mounting
CN1787002B (en) Product information protecting method and system
KR101143729B1 (en) Method for preventing reproduction of nfc tag and system thereof
GB2387744A (en) Transponder alarm system
JP2005306502A (en) Article management system
CN1074844C (en) Radio-frequency integrated circuit module electronic anti-false trademark and its identification method
Patil Rfid Tags And Security Mechanism In Library
EP1872308A2 (en) System and method for combining rfid tag memory
JPH0962934A (en) Tag and system for inventory management with shoplifting preventing function
NagaLakshmi et al. A Security Mechanism for library management system using low cost RFID tags