WO2000039741A1 - Systeme de securite par identification a hautes frequences comportant un circuit d'emulation hautes frequences - Google Patents

Systeme de securite par identification a hautes frequences comportant un circuit d'emulation hautes frequences Download PDF

Info

Publication number
WO2000039741A1
WO2000039741A1 PCT/US1999/030549 US9930549W WO0039741A1 WO 2000039741 A1 WO2000039741 A1 WO 2000039741A1 US 9930549 W US9930549 W US 9930549W WO 0039741 A1 WO0039741 A1 WO 0039741A1
Authority
WO
WIPO (PCT)
Prior art keywords
coupled
electronic key
rfid
circuit
reading mechanism
Prior art date
Application number
PCT/US1999/030549
Other languages
English (en)
Inventor
Lee Youbok
Peter Sorrells
Original Assignee
Microchip Technology Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microchip Technology Incorporated filed Critical Microchip Technology Incorporated
Priority to EP99967495A priority Critical patent/EP1057135A1/fr
Priority to KR1020007009337A priority patent/KR20010041244A/ko
Priority to JP2000591567A priority patent/JP2002533846A/ja
Publication of WO2000039741A1 publication Critical patent/WO2000039741A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer

Definitions

  • This invention relates generally to a Radio Frequency Identification (RFID) security device and, more specifically, to an RFID security system wherein the RFID tag and its complementary reader/interrogator device utilize an RF emulating circuit which substitutes the RF portion of the data communication with a hardwired secure bus.
  • RFID Radio Frequency Identification
  • Serial EEPROM based keys require 4 to 5 separate contacts in order to operate. One contact is used for each of power, ground, clock, and data. Two contacts may be used for data transfer (i.e., one as an input contact and one as an output contact). Each of the multiple contacts in the serial EEPROM based key must make proper contact in order to transfer clock and data through them. In apartment or hotel applications, users returning from a swimming pool may insert a wet key into the lock. This causes poor contact or shorts between the contacts which prevents proper transfer of data, thereby preventing the lock from opening.
  • a second type of electronic key utilizes access control 10 RFID tags.
  • a card or tag is presented to a reading device to gain access to a building.
  • this type of electronic key is used for identification applications rather than for security. Using this type of electronic key for security (apartment and hotel locks) creates a problem since these types of keys are not very secure.
  • the improved RFID security should require few contacts for data transfer.
  • the improved RFID security device must further be universal in polarity.
  • the improved RFID security device must be resistant to environmental elements.
  • the improved RFID security device must also be able to be used for security and must further be resistant to "code grabbing".
  • the improved RFID security device would be a low cost solution to solving the above mentioned problems.
  • the improved RFID security system would replace the RF portion of both the electronic key and the reading mechanism with simpler lower cost circuitry.
  • a Radio 5 Frequency Identification (RFID) security system uses an electronic key for storing data.
  • a reading mechanism is provided and is used for reading a modulated signal having the data stored on the electronic key when the electronic key is coupled to the reading mechanism.
  • An RF emulating circuit is coupled to the reading mechanism for emulating an RF energy signal to the electronic ° key for allowing the reading mechanism to read the data stored on the electronic key when the electronic key is coupled to the reading mechanism.
  • Figure 2 is a simplified electrical block diagram of one embodiment of the present invention.
  • Figure 3 is a simplified electrical schematic of one embodiment of the RF emulating circuit used in the present invention.
  • Figure 4 is a simplified electrical schematic of a second 10 embodiment of the
  • Figure 5 is an electrical block diagram of the simplified reading mechanism used in the present invention.
  • Figure 6A is a timing diagram of the modulated RF energy 15 carrier signal.
  • Figure 6B is a timing diagram of the demodulated base band data signal.
  • RFID Radio Frequency Identification
  • the RFID tag device 12 is configured as an electronic key and is programmed to store data on the electronic key.
  • RFID tag 12 is coupled to the reading 0 mechanism 14 via the RF emulating circuit 16
  • the data stored on the RFID tag device 12 will be read by the reading mechanism 14. If the proper RFID tag 12 has been inserted into the reading mechanism 14, the reading mechanism 14 will release a locking device (not shown) or perform other actions according to its specific application.
  • an energizing circuit needs to be coupled to the RFID tag device 12 and the reading mechanism 14.
  • the RF portions of both the RFID tag device 12 and the reading mechanism 14 have been replaced with lower cost circuitry.
  • the present invention uses an RF emulating circuit 16.
  • the RF emulating circuit 16 is used to emulate an RF energy carrier signal to the RFID tag device 12.
  • a "modulated" signal is then sent back to the reading mechanism 14.
  • the reading mechanism 14 is able to filter out the carrier signal in order to read the data stored on the RFID tag device 12.
  • the electronic key is basically comprised of two main components: the RFID tag device 12 and a contact device 20.
  • the RFID tag device 12 is used to store the data to be read by the reading mechanism 14.
  • the RFID tag device 12 is coupled to the contact device 20.
  • the contact device 20 is used to couple the RFID tag device 12 to the RF emulating circuit 16.
  • the RF emulating Circuit 16 will emulate and send an RF energy carrier signal to the RFID tag device 12.
  • the RFID tag device 12 is energized by the incoming RF energy carrier signal and is activated.
  • the RFID tag device 12 sends back the contents of its memory by modulating the incoming RF energy carrier signal. This "modulated" signal is then sent back to the reading mechanism 14. The reading mechanism 14 is then able to filter out the carrier signal and read the data stored on the RFID tag device 12.
  • the RF emulating circuit 16 uses a switching element 22.
  • the switching element 22 is a transistor.
  • a resistor 24 has a first terminal coupled to the switching element 22 and a second terminal coupled to a voltage source Ncc.
  • a second resistor 26 has a first terminal coupled to the switching element 22 and a second terminal coupled to a contact device 28.
  • the contact device 28 is used to couple the RF emulating circuit 16 to the electronic key 18 ( Figures 1 and 2) when the electronic key 18 ( Figures 1 and 2) is inserted into the reading mechanism 14 ( Figures 1 and 2) when the electronic key 18 ( Figures 1 and 2) is inserted into the reading mechanism 14 ( Figures 1 and 2).
  • the first resistor 24 and the second resistor 26 form a voltage divider circuit.
  • the switching element 22 along with the first 24 and the second resistor 26 form a drive circuit to simulate the carrier signal to the RFID tag device 12 ( Figures 1 and 2).
  • Careful selection of the resistors 24 and 26 and the on resistance of the switching element 22 will allow the RF emulating circuit 16 to drive the RFID tag device 12 ( Figures 1 and 2) with sufficient current and voltage for power up and proper operation of the RFID tag device 12.
  • the RFID tag device 12 When the RFID tag device 12 ( Figures 1 and 2) is powered by the carrier signal from the RF emulating circuit 16, the RFID tag device's internal clock runs synchronously with the carrier signal and the stored data in the RFID tag device 12 is used to "modulate" the carrier signal.
  • This modulated RF signal is fed to the simplified RFID reader 14 via the RF emulating circuit 16.
  • the on resistance of the RFID tag device 12 causes a square wave to be superimposed on the carrier signal present at point B (see Figure 6 A).
  • the reading mechanism 14 ( Figures 1 and 2) can then demodulate the signal and extract the tag data stream to obtain the data stored on the RFID tag device 12.
  • the RFID tag device 12 has an on resistance of 10k ohms and an off resistance of 100k ohms. Both the first resistor 24 and the second resistor 26 have a resistance of 10k ohms.
  • the voltage source will supply a voltage level of 5 volts.
  • the switching element 22 will receive a carrier signal from the reading mechanism 14 ( Figures 1 and 2).
  • the carrier signal will have a high and low voltage level which will activate and deactivate the switching element 22 (i.e., the carrier signal may have a voltage level from 0 to 5 volts).
  • the voltage at Point B will be a square wave with a voltage level of 0 volts.
  • the voltage at Point B When the switching element is deactivated, the voltage at Point B will be either 4.2 volts for the off resistance level of the RFID tag device 12 or 1.7 volts for the on resistance level of the RFID tag device 12.
  • the modulated carrier signal is shown in Figure 6A.
  • the signal is demodulated to extract the data content of the memory in the RFID tag device 12.
  • the simplified reader 14 also has a microcontroller (or processor) to decode the demodulated signal. See Figures 6A and 63 for modulate and demodulated signals respectively.
  • the carrier signal can be filtered out in the simplified reader 14 with a simple filter or comparator circuit.
  • the data stream (see Figure 6B) from 1.7 volts to 4.2 volts can then be driven into a data decoding circuitry (microcontroller) with no amplification.
  • the RF emulating circuit 16 will replace the L-C circuit of both the prior art electronic key and of the reading mechanism thereby allowing for the simplified electronic key 18 ( Figure 1 and 2) and the reading mechanism 14 ( Figure 1 and 2) which form part the present invention.
  • the RF emulating circuit 16 uses a single resistor 30.
  • the resistor has a first terminal coupled to an output of the reading mechanism 14 ( Figures 1 and 2) and a second terminal coupled to an input of the reading mechanism 14 ( Figures 1 and 2).
  • the second terminal of the resistor 30 is also coupled to a contact circuit 28.
  • the contact circuit 28 is used to couple the RF emulating circuit 16 to the electronic key 18 ( Figures 1 and 2) when the electronic key 18 ( Figures 1 and 2) is inserted into the reading mechanism 14 ( Figures 1 and 2).
  • the operation of the embodiment depicted in Figure 4 will operate in a similar manner to that disclosed in Figure 3.
  • the carrier signal will be driven onto the resistor 30.
  • the voltage level at Point B will again be one of three voltage levels.
  • the carrier signal can be filtered out with a simple filter or comparator circuit.
  • a modulated signal appears at Point B.
  • the data signal can be obtained by demodulating the output signal.
  • the resulting signal can then be driven into a data decoding circuitry with no amplification.
  • the reading mechanism 14 used in the present invention is shown.
  • the reading mechanism 14 greatly simplifies the RFID readers currently being used to read RFID tag devices.
  • the reading mechanism 14 is used for reading the data stored on the electronic key when the electronic key is coupled to the reading mechanism 14.
  • the reading mechanism 14 uses a processor for reading the data stream containing the data stored on the electronic key 18 ( Figure 2) when the electronic key 18 ( Figure 2) when the electronic key 18 ( Figure 2) is coupled to the reading mechanism 14 via the RF emulating circuit 16 ( Figures 1-4).
  • the processor is a microcontroller.
  • a timing device 34 is coupled to the processor 32 and to the RF emulating circuit 16.
  • the timing device 34 is used for providing a clock signal to both the processor 32 and to the RF emulating Circuit 16.
  • the timing device 34 may be an oscillator or any other type of device that may generate a clock signal.
  • a signal passing circuit 36 i.e., demodulator
  • the signal passing circuit 36 is used for demodulating and filtering out the carrier signal and for driving the data stream into the processor 32 with no amplification.
  • a comparator circuit coupled to a reference signal or a low pass filter are two examples of a signal passing circuit 36. In the preferred embodiment of the present invention, a low pass filter is used.

Abstract

L'invention concerne un système de sécurité (10) par identification à hautes fréquences. Ce système utilise une clé électronique (12) pour mémoriser les données. Un mécanisme de lecture (14) est prévu et permet de lire un signal modulé, les données étant mémorisées sur la clé électronique (12) lorsque cette dernière est couplé au mécanisme de lecture (14). Un circuit d'émulation HF (16) est couplé au mécanisme de lecture (14) pour émuler un signal d'énergie HF vers la clé électronique (12) afin de permettre au mécanisme de lecture (14) de lire les données mémorisées sur la clé électronique (12) lorsque cette dernière est couplée au mécanisme de lecture (14).
PCT/US1999/030549 1998-12-23 1999-12-20 Systeme de securite par identification a hautes frequences comportant un circuit d'emulation hautes frequences WO2000039741A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP99967495A EP1057135A1 (fr) 1998-12-23 1999-12-20 Systeme de securite par identification a hautes frequences comportant un circuit d'emulation hautes frequences
KR1020007009337A KR20010041244A (ko) 1998-12-23 1999-12-20 알에프 에뮬레이팅 회로를 갖는 라디오 주파수 식별 보안시스템
JP2000591567A JP2002533846A (ja) 1998-12-23 1999-12-20 Rfエミュレート回路を有する無線周波識別(rfid)セキュリティシステム

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US21997998A 1998-12-23 1998-12-23
US09/219,979 1998-12-23

Publications (1)

Publication Number Publication Date
WO2000039741A1 true WO2000039741A1 (fr) 2000-07-06

Family

ID=22821534

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/030549 WO2000039741A1 (fr) 1998-12-23 1999-12-20 Systeme de securite par identification a hautes frequences comportant un circuit d'emulation hautes frequences

Country Status (6)

Country Link
EP (1) EP1057135A1 (fr)
JP (1) JP2002533846A (fr)
KR (1) KR20010041244A (fr)
CN (1) CN1293788A (fr)
TW (1) TW463138B (fr)
WO (1) WO2000039741A1 (fr)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG107577A1 (en) * 2001-02-21 2004-12-29 Ibm Method to address security and privacy issues of the use of rfid systems to track consumer products
EP1898336A1 (fr) * 2006-09-11 2008-03-12 Inside Contactless Procédé de connexion d`un circuit intégré sans contact à un composant NFC
EP2050039A2 (fr) * 2006-10-13 2009-04-22 Aspect Medical System, Inc. Système de détection et communication avec des dispositifs mémoires rfid
CN101775922A (zh) * 2009-12-31 2010-07-14 上海杰远环保科技有限公司 一种射频导路钥匙、锁芯系统及其实现方法
US20100240303A1 (en) * 2009-03-20 2010-09-23 Inside Contactless Process for establishing a data link between two processors, specifically within an nfc chipset
CN102199953A (zh) * 2011-04-20 2011-09-28 翟达 一种电子钥匙以及相配套的rfid电子锁
TWI419488B (zh) * 2005-08-09 2013-12-11 Sk Planet Co Ltd 安全近距離通訊設備及用於支援不同的安全模組之方法

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003242469A (ja) * 2002-02-21 2003-08-29 Daishowa Seiki Co Ltd 情報保持体
AU2003254936B2 (en) * 2003-08-11 2009-05-21 Hitachi, Ltd. Reading method, responder, and interrogator
CN102054057B (zh) * 2009-11-09 2012-09-05 上海华虹Nec电子有限公司 Rfid标签电路的模拟仿真方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2336741A1 (fr) * 1976-12-17 1977-07-22 Kreft Hans Diedrich Dispositif pour l'identification d'une information
US4990756A (en) * 1988-07-25 1991-02-05 Telsor Corporation Apparatus and method for emulating bar codes
EP0513507A1 (fr) * 1991-04-22 1992-11-19 Kabushiki Kaisha Toshiba Dispositif électronique portatif à protocoles de communication multiples
US5679945A (en) * 1995-03-31 1997-10-21 Cybermark, L.L.C. Intelligent card reader having emulation features
US5841390A (en) * 1994-07-05 1998-11-24 Tsui; Philip Y. W. Remote transmitter-receiver controller for multiple systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2336741A1 (fr) * 1976-12-17 1977-07-22 Kreft Hans Diedrich Dispositif pour l'identification d'une information
US4990756A (en) * 1988-07-25 1991-02-05 Telsor Corporation Apparatus and method for emulating bar codes
EP0513507A1 (fr) * 1991-04-22 1992-11-19 Kabushiki Kaisha Toshiba Dispositif électronique portatif à protocoles de communication multiples
US5841390A (en) * 1994-07-05 1998-11-24 Tsui; Philip Y. W. Remote transmitter-receiver controller for multiple systems
US5679945A (en) * 1995-03-31 1997-10-21 Cybermark, L.L.C. Intelligent card reader having emulation features

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG107577A1 (en) * 2001-02-21 2004-12-29 Ibm Method to address security and privacy issues of the use of rfid systems to track consumer products
US7000834B2 (en) 2001-02-21 2006-02-21 International Business Machines Corporation Method to address security and privacy issue of the use of RFID systems to track consumer products
TWI419488B (zh) * 2005-08-09 2013-12-11 Sk Planet Co Ltd 安全近距離通訊設備及用於支援不同的安全模組之方法
EP1898336A1 (fr) * 2006-09-11 2008-03-12 Inside Contactless Procédé de connexion d`un circuit intégré sans contact à un composant NFC
FR2905782A1 (fr) * 2006-09-11 2008-03-14 Inside Contactless Sa Procede de connexion d'un circuit integre sans contact a un composant nfc.
EP2050039A2 (fr) * 2006-10-13 2009-04-22 Aspect Medical System, Inc. Système de détection et communication avec des dispositifs mémoires rfid
US8866592B2 (en) 2006-10-13 2014-10-21 Covidien Lp Method for detecting and communicating with RFID memory devices
US20100240303A1 (en) * 2009-03-20 2010-09-23 Inside Contactless Process for establishing a data link between two processors, specifically within an nfc chipset
US8620214B2 (en) * 2009-03-20 2013-12-31 Inside Secure Process for establishing a data link between two processors, specifically within an NFC chipset
CN101775922A (zh) * 2009-12-31 2010-07-14 上海杰远环保科技有限公司 一种射频导路钥匙、锁芯系统及其实现方法
CN102199953A (zh) * 2011-04-20 2011-09-28 翟达 一种电子钥匙以及相配套的rfid电子锁
CN102199953B (zh) * 2011-04-20 2013-04-17 江苏奥英万科技有限公司 一种电子钥匙以及相配套的rfid电子锁

Also Published As

Publication number Publication date
TW463138B (en) 2001-11-11
JP2002533846A (ja) 2002-10-08
KR20010041244A (ko) 2001-05-15
EP1057135A1 (fr) 2000-12-06
CN1293788A (zh) 2001-05-02

Similar Documents

Publication Publication Date Title
EP1251452B1 (fr) Etiquette d'identification électronique multimémoire
US5499017A (en) Multi-memory electronic identification tag
US5257011A (en) Data altering means for multi-memory electronic identification tag
US6616035B2 (en) Method and device for identification and authentication
WO2000034605A1 (fr) Dispositif de sécurité d'identification de radiofréquence (rfid)
EP1684215B1 (fr) Utilisation d'un laser pour communiquer de manière sécurisée avec des étiquettes d'identification par radiofréquence
KR101433623B1 (ko) 복제 방지 시스템
WO2000039741A1 (fr) Systeme de securite par identification a hautes frequences comportant un circuit d'emulation hautes frequences
CN101573717A (zh) Rfid设备的扩展功能
US10235615B2 (en) Acquiring, storing, and transmitting RFID credential data
US4857913A (en) Coded objects identifiable by proximity and devices for changing the codes of these objects
US20020077061A1 (en) Inductive coupling data send/receive circuit
WO2002019265A3 (fr) Securisation de dispositif de configuration de systeme
JPS62129476A (ja) 個人識別装置
JPH02153178A (ja) ポータブルな物体との交換装置との間で情報を交換するためのシステム
US6700551B2 (en) Antenna signal amplitude modulation method
US6809628B1 (en) Personal or personalizable device for the conditional use of electric or electronic appliances, method of use
JP3983885B2 (ja) 複合icカード及び複合icカード用icモジュール
JP4766070B2 (ja) 非接触型データキャリアのアクセスシステム
JPH11127088A (ja) 送信機
CN2459406Y (zh) 可自制钥匙卡的感应式电子门锁
JP2000207506A (ja) 非接触型icカ―ドシステム
WO1989002507A1 (fr) Agencement de serrure de surete
KR100849695B1 (ko) 액티브 태그, 리더, 및 이들을 이용한 페어링 방법
KR200330153Y1 (ko) IrDA를 사용한 미약 전류로 동작하는 전자키

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 99803971.3

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): CN JP KR

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

ENP Entry into the national phase

Ref document number: 2000 591567

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 1020007009337

Country of ref document: KR

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 1999967495

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1999967495

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1020007009337

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1999967495

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1020007009337

Country of ref document: KR