The present invention is related an electronic tag, and, more particularly, to a system and method for operating an electronic tag.
A radio frequency identification (RFID) system commonly includes an RFID tag, an RFID reader, and a computer or controller. The RFID tag includes an inlay which includes an integrated circuit (IC) and an antenna. The IC is complied with functions in a communication interface protocol, for example, ISO 18000-6C/EPC C1 GEN2, ISO 18000-3M3, or ISO 18000-3. The antenna is laid in the RFID tag by special packaging technique. The reader communicates with the RFID tag and accesses information from it by specified instructions. The RFID tag includes a tag identifier which includes a unique tag serial number and a manufacturer identifier, and further includes a memory space for storing information. Setting program processing parameters of the computer are required for the communication mode between the RFID tag and the reader, wherein the parameters include a communication channel, a session number, a pulse width, a link frequency, a modulation mode, a bit rate, and an antenna transmitting power. When the RFID tag comes within a read range of the reader, the reader can then access information in the RFID tag. In addition, a communication system commonly includes an electronic tag, a reader used to read the electronic tag, and a computer or controller coupled to the reader. For instance, the electronic tag is one of an RFID tag and an integrated circuit tag.
Although there have been more than 1.4 millions of automatic teller machines (ATM) built around the globe to provide 24 hours banking services, yet there are still hundreds and thousands of customers and/or users everyday come to banks everywhere for some financial business. Not only they need to fill out deposit or withdraw or transfer slip, but also are asked in front of bank teller about savings account number, user name, and amount of deposit or withdraw or transfer, also asked to provide signature, seal, credentials for proving one's status, and enter a password to be compared by bank's computer system, after passing the proving one's status and comparing password successfully, can then make a withdraw. These authenticating ways are quite inconvenient for elderly people who cannot hear or see well, therefore, some new RFID tag is expected which will store information necessary for a user to make a financial transaction, and provided with some authentication method for anti-counterfeiting and belonging to the same system, then the drawback of filling transaction slip manually by hand can be eliminated by using such RFID tag.
Currently RFID in HF applications, finance card or credit card has been combined with using cash card to pay expense amount, and widely used in our daily life, for example, paying fees for taking bus, train, mass transit transportation system, making a tour, or shopping, but still sees vehicles stopped in parking lot or toll station on highway to pay the fees, therefore, some new card and system is expected which combines RFID UHF long distance technique and pay cash function, to be placed on vehicle so that fees can be paid while vehicle is moving to eliminate the otherwise required manpower, and suitable to current RFID HF applications as well.
Since in addition to financial business application, RFID tag finds applications in other business fields such as asset management, access control, pay cash, product manufacturing management, hospital drug and care management, and item level tracking, if some method of verifying RFID tag for anti-counterfeiting can be applied to financial business, then the same can be applied to other business fields, therefore the method is also expected to have business category encoded in the RFID tag, then the same can be applied to many business fields at the same time, for example, some device combining business fields such as finance, pay cash, and access control, can be used for making transactions on a new ATM, purchasing in a convenient store, and starting electric facilities in an access control area.
In U.S. Pat. No. 6,130,623, which issued on Oct. 10, 2000 to MacLellan et al, an application filed Dec. 31, 1996, there is disclosed ‘Encryption For Modulated Backscatter Systems,’ in which tag, interrogator, and techniques of information exchange in between is mentioned, communication session between a tag and interrogator through a RFID system, intercepting of transferring sensitive information like PIN number by eavesdropper, intercepting of data stored in the tag's memory by fraudulent interrogator, obtaining network service and further stealing data stored in the network by fraudulent tag, all result in major security issues. A method of encrypting the user's PIN is thus mentioned for resolving the leak of sensitive information. However, it is still expected to have more effective method for protecting the sensitive information and ensuring the system safety.
In an IEEE paper, which issued on Oct. 10, 2000 titled ‘A Low-cost UHF RFID Tag Baseband with an IDEA Cryptography Engine,’ in which a mutual authentication scheme based on International Encryption Algorithm (IDEA) is applied to the transferring tag data, but the IDEA engine used between reader and tag needs to add integrated circuit, such implementation not only requires complicated operations, but also increases the system cost.
It is therefore an embodiment of the present disclosure to provide a system for operating an electronic tag. The electronic tag is coupled to an object and stores a variable state code and a variable physical parameter code. The variable state code represents a variable state which the object is configured to be in. The variable physical parameter code represents a variable physical parameter associated with the object. The system includes a reader and an operation device. The operation device is coupled to the reader. Under a condition that the variable physical parameter is substantially equal to a first specific physical parameter, the operation device makes a first logical decision on whether the variable state code is currently equal to a first specific state code representing a first specific state via the reader. Under a condition that the first logical decision is true, the operation device changes the variable state code from the first specific state code to a second specific state code representing a second specific state being different from the first specific state via the reader, and assigns a first specific physical parameter code representing the first specific physical parameter to the variable physical parameter code via the reader.
It is therefore another embodiment of the present disclosure to provide an electronic tag to be operated by a system. The electronic tag is coupled to an object, and includes a tag memory. The tag memory stores a variable state code and a variable physical parameter code, wherein the variable state code represents a variable state which the object is configured to be in, and the variable physical parameter code represents a variable physical parameter associated with the object. Under a condition that the variable physical parameter is substantially equal to a first specific physical parameter, a first logical decision is made by the system on whether the variable state code is currently equal to a first specific state code representing a first specific state. Under a condition that the first logical decision is true: the variable state code is changed by the system from the first specific state code to a second specific state code representing a second specific state being different from the first specific state; and a first specific physical parameter code representing the first specific physical parameter is assigned to the variable physical parameter code by the system.
It is therefore another embodiment of the present disclosure to provide a method for operating an electronic tag, wherein the electronic tag is coupled to an object and stores a variable state code and a variable physical parameter code, the variable state code represents a variable state which the object is configured to be in, and the variable physical parameter code represents a variable physical parameter associated with the object. The method includes steps of: under a condition that the variable physical parameter is substantially equal to a first specific physical parameter, making a logical decision on whether the variable state code is currently equal to a first specific state code representing a first specific state; and under a condition that the logical decision is true, changing the variable state code from the first specific state code to a second specific state code representing a second specific state being different from the first specific state, and assigning a first specific physical parameter code representing the first specific physical parameter to the variable physical parameter code.
It is therefore an embodiment of the present disclosure to provide a method for securing an electronic tag storing an application code information and a communication target indicator to be used to link to a specific external device. The method includes the following steps. A specific application function for using the application code information is provided. The electronic tag is applied to the specific application function. A transaction message for the specific application function is generated according to the application code information. And, the transaction message is sent to the specific external device according to the communication target indicator.
It is therefore another embodiment of the present disclosure to provide an electronic tag to be authenticated in an authentication phase. The electronic tag includes a tag memory. The tag memory stores an encryption key and an information table. The information table has a specific storing attribute quantified with a predetermined value, and is read after the authentication phase by using the predetermined value. The encryption key is derived from the predetermined value, and decrypted in the authentication phase to authenticate the electronic tag.
It is therefore still another embodiment of the present disclosure to provide a system for securing an electronic tag having a specific identifier. The system includes an operation device and a reader coupled to the operation device. The operation device provides a password mask and a first information table, wherein the first information table includes a plurality of information elements arranged according to an order. The operation device adjusts the order according to the specific identifier and the password mask to generate a second information table.
In view of the drawbacks of the prior art and expectation, the present invention uses RFID technique and combination of decrypting an encrypted key, encoding, sending brief message, and adjusting parameter ordering, according to a method of building a new RFID RFID tag and its device and authenticating an RFID tag by a RFID tag item processing system (TIPS) in plural authentication steps, the system functions of the present invention is applied to many business fields by means of encoding, and sending a brief message is used as an authentication method of system safety. When a local computer proceeds dialogue with RFID tag through a reader according to an instruction of a communication interface protocol, a frame is commonly used for sending instruction and information, and time stamp, instruction code and parameters, protocol control (PC) information, unique item identifier (UII) and CRC are included in the frame. Providing that UII includes item authentication information for multipurpose and multi-function, such as savings account number, savings account password, credit account number, counter service password, credit account password, compare failed count, cash card information, and encrypted keys, these information will have 10 to 44 different number of words, the ordering of some information can even be made different for different RFID tag, then it becomes almost impossible for someone to steal a password information by eavesdropping, therefore the communication link between RFID reader and RFID tag becomes safer, the areas of improving protection and against eavesdropping are fallen in authenticating an RFID tag for its anti-counterfeiting instead.
Also in view of current bank operation procedure, which requires account holder (or user) to fill out a transaction slip for making a deposit, withdraw or transfer, needs to be simplified. The present invention comes to a method of building an item information table used by a RFID TIPS, the method is to build an item information table in an RFID tag with memory for a user, the item information table includes user's savings account number, counter service password, and encrypted key. When comes to a bank, user only needs to place the RFID tag on bank teller's RFID reader, no need to fill out a transaction slip for making a deposit, withdraw or transfer, the bank teller will then execute a RFID TIPS' program on the local computer for the RFID reader to read the item information table from the RFID tag, and ask user to present some credentials for proving the user status prior to the use of savings account number in the item information table, when making a withdraw, the bank teller will ask user to enter a counter service password through a numerical key pad for comparison. After passing the comparing passwords successfully, RFID TIPS can then proceed with a following operating procedure, which includes transfer cash to the RFID tag. When the item information table includes savings account password or credit account password, the RFID tag can be used on a new ATM. When the item information table further includes cash card information including such as cash card balance, cash card store category, cash card merchant serial number, variable status code associated with cash card use, and cash card getting on station number, the RFID tag can then be used for deducting from or adding to the cash card balance an amount at stores. Some device can be made by combining the RFID tag and a UHF antenna, and having an item information table just described above built in the RFID tag, for example, combining savings account number with cash card function, or combining credit account number with cash card function, then having the RFID tag hung in a vehicle or placed in a slot which is attached to the vehicle, and made the RFID tag facing the moving direction of the vehicle and fixed in the slot with ability of being adjusted minutely to turn right and left, or tilt up, then the vehicle can pay fees by deducting an amount while moving on highway or in parking lot. When the item information table combining function to select monetary base for storing the cash card balance, user can then use the RFID tag for storing foreign currency purchased from bank. Providing that the same function to select monetary base can be used at stores in another country, when user makes a purchase, the monetary base of purchase amount set at the store is different from that stored in the RFID tag of user, then RFID TIPS needs only to connect to database device of a financial center through internet, obtain the monetary exchange rate, convert the user's purchase amount to have the same monetary base as the cash card balance, and proceeds to authenticate the RFID tag and deduct or add an amount, thus the RFID tag can be used globally as having cash in hand.
Since the item information table includes item information of multipurpose and multi-function, it is necessary to improve authenticating the RFID tag for anti-counterfeit, therefore, the present invention comes to a method of plural authentication for RFID TIPS, which includes a method of authenticating the RFID tag for anti-counterfeiting and belonging to the same system, and a method of authenticating user password. The former method includes building an item information table with encoded parameters in the RFID tag, the item information table includes item code, item serial number, user serial number, and encrypted key, wherein the encrypted key and the user serial number are used to authenticate the RFID tag for anti-counterfeiting and belonging to the same system. When RFID TIPS selecting RFID tag according to item code in the RFID tag, the RFID TIPS not only is made more efficient, but also can prevent other item information from being exposed prior to the authentication, decrypting the encrypted key can just authenticate the RFID tag for anti-counterfeiting and belonging to the same system. In addition, the plural authentication method further comes to divide the item information table stored in the tag memory space of RFID tag into first memory block information table, second memory block information table and third memory block information table, the first memory block information table only includes the item information needed in first authentication step, for example, item code, item serial number, user serial number, and encrypted key, wherein the encrypted key is created by item serial number, user serial number, and word length of second memory block information table, the user serial number is a serial number starting from 1, or a system code number, and other item information used in second authentication step such as savings account number, savings account password, counter service password, and cash card information, are stored in the second memory block information table. Mechanisms for keeping item information table from exposure and against eavesdropping includes decrypting the encrypted key to obtain word length of second memory block information table, and verifying the same word length for belonging to the same system, and then reading the second memory block information table, in addition, other item information used after passed the second authentication step includes, for example, user's transfer account numbers needed by the processing system, are stored in the third memory block information table. And the plural authentication method is to add another encrypted connecting key to the second memory block information table which includes word length of the third memory block information table, decrypting the encrypted connecting key for obtaining the word length and reading the third memory block information table, in different business fields and systems, the encrypted connecting key is not included in the second memory block information table, but a receiving brief message phone number is included instead, when finishing using item information table of the RFID tag, the processing system will compose a brief message by combining time, location, and transaction summary, and transmit it to the receiving brief message phone number, thus another way of confirming use of the RFID tag is provided for the user. Since no password information is sending alone in every authentication step, the plural authentication method used in the present invention provides a safe and most cost effective way of communication against counterfeiting and eavesdropping.
When bank teller executes RFID TIPS' program to select item code of an RFID tag through a reader for obtaining item information table from RFID tag, the RFID tag will only send back its first memory block information table, which includes first memory block authentication information and first memory block other information, the first memory block authentication information includes item code, user serial number, and encrypted key, the first memory block other information includes item serial number, PC information with an initial value, and 16 bit CRC. The method of authenticating the RFID tag for anti-counterfeiting includes TIPS decrypting the encrypted key, reading tag identifier of the RFID tag through reader according to the same method, and then authenticating the RFID tag for anti-counterfeiting and belonging to the same system, and obtaining word length of the second memory block information table, thus completing the first step of authentication. The method of authenticating user's counter service password includes TIPS asking user to enter an authentication password by numerical key pad, after decrypting the encrypted key successfully, the TIPS will read second memory block information table of the RFID tag through reader, which includes second memory block authentication information and second memory block other information, the second memory block authentication information includes savings account number, counter service password, and encrypted connecting key, the second memory block other information includes savings account password, compare failed count, and cash card information, then compare the authentication password entered by user earlier to the counter service password read from the RFID tag, after passing the comparing passwords successfully, the TIPS will connect to bank database device through internet, using the savings account number as index, for obtaining user's information and displaying on the display unit, which includes information such as user's personal identifier, account name, birthday, address, telephone number, email address, and professions, and then bank teller will compare user's credentials presented earlier to the information shown on the display unit. After passing the comparing passwords successfully, thus the second step of authentication is completed, then bank teller will proceed with the following operating procedure by using the savings account number, therefore user does not need to fill out deposit, withdraw or transfer slip. When user using a new ATM for making transaction, the plural authentication method further includes selecting an authentication type and entering a password by user, the TIPS will select a password from the second memory block authentication information as authentication information, and compare the entered authentication password to the selected authentication information, after passing the comparing passwords successfully, then decrypt the encrypted connecting key, and obtain word length of the third memory block information table, when user selecting transfer service, the TIPS will read third memory block information table stored in the RFID tag through reader which includes transfer account numbers which are preset by user in advance, and shown on the display unit for user to select and proceed with the transaction.
When user makes transaction on a new ATM, transaction types provided by RFID TIPS for user to select includes savings account transaction, credit account transaction, add cash transaction. For selecting savings account transaction, user enters savings account password, for selecting credit account transaction, user enters credit account password, for selecting add cash transaction, user enters cash card password. When user uses cash card for making purchase or adding cash, although comparing authentication information is not required currently for using cash card to pay expense, however for preventing once cash card or credit card with high cash advance amount is lost or account is hacked and illegally used, according to the plural authentication method used in the present invention, it only needs to use the counter service password in the second memory block information table of the RFID tag as cash card password, or include a cash card password to the second memory block information table, and have the TIPS ask user to enter a cash card password, after passing the authenticating cash card password successfully, then proceed with pay cash transaction, thus illegal or unauthorized use of the lost card is prevented.
In addition to financial business, method of authenticating the RFID tag for anti-counterfeiting can be applied to many other business fields such as asset management, access control, pay cash, cross-country product manufacturing resume management, cross-country product tracking management. Therefore, the present invention comes to define an encoded parameter like item code which includes categories such as business field, device, selecting enable function, function, deployment country, and have it stored in item information table of RFID tag, so that the method of authenticating the RFID tag for anti-counterfeiting is used in financial business, the same can be applied to other business fields, or even applied to cross-country business fields other than financial business. For example, in a RFID asset management system, following authenticating the RFID tag for anti-counterfeiting, comparing authentication information can be set up, and after passing the comparing successfully, the authorization limits is obtained for entering the same system to inquire and modify asset records. In such asset management system, item code can be used in selecting RFID tag through reader, and the system can be made more effectively, therefore it is expected that RFID tag to have item code which includes categories like business field, device, selecting enable function, function, deployment country, to improve the overall TIPS' processing efficiency, and extend in applying method of authenticating the RFID tag for anti-counterfeiting. For another example in a RFID access control management system, building item information table in electric tag which includes a RFID access control table, each and every bit of the RFID access control table corresponding to an authorized to pass and use signal of an access control area, the access control area includes sentry box or parking lot with electronic gate, office area or building or health center with electronic lock, and residence or community or building with electronic roll-up doors, when using the electronic gate for passing an access control area, a safe and better method is to authenticate the RFID tag for anti-counterfeiting first, and then verify the setting of a bit in the RFID access control table corresponding to the access control area, providing the corresponding bit value is a 1, then passing through and entering the access control area is allowed, and proceeds to start electronic facilities of the access control area, which includes starting electronic gates, roll-up door, warning lights, warning alarms, electronic door lock, luminaires, display units for access control messages, and other electronic equipment, providing the corresponding bit value is a 0, then passing through and entering the access control area is not allowed, and proceeds to start electronic warning devices for not passing through the access control area including starting warning lights, warning alarms, or sending a warning message, however when building a safe access control management system, no matter what the authentication result of the RFID tag is, system with another improving safety measure is provided by recording each event when authenticating the RFID tag, and sending a brief access control message or email to the receiving brief message phone number in the item information table.
Based upon the concept described above, it is therefore an aspect of the present invention to provide a method of building an item information table in an RFID tag memory for a RFID TIPS, the RFID tag includes tag identifier (TID), reserved memory (RM) space, unique item identifier (UII) space, and user memory (UM) space, the TID includes tag serial number (TagSN) and manufacturing identifier (MID), the method of building the item information table includes building item kill password and item access password, and also includes dividing UII space into first memory block information table and second memory block information table, the UM space includes third memory block information table, and building in the first memory block information table to include first authentication information, first encrypted key, and first other information, wherein the first authentication information includes item code, user serial number, the user serial number indicating a system constant value or a system code number, the first other information includes item serial number and first PC information, the first PC information having a starting value, and building in the second memory block information table to include second authentication information and second other information, wherein the second authentication information includes savings account password, credit account password, counter service password and cash card balance, the second other information includes savings account number, compare failed count, cash card balance monetary base, cash card store category, cash card merchant serial number, variable status code associated with cash card use, and cash card getting on station number, and building in the third memory block information table to include third information table, wherein the third information table includes a transfer account number table, or a RFID access control table, or a receiving brief message phone number table, or a combination of the above.
By integrating the concepts described above, it is therefore another aspect of the present invention to provide a method of plural authenticating an RFID tag for a RFID TIPS, the RFID tag includes a tag identifier and a tag memory, the tag memory is divided into memory sectors and blocks, including RM block, UII block, first memory block, second memory block and third memory block, and the RM block stores item kill password and item access password, the first memory block stores first information table, the second memory block stores second information table, the third memory block stores third information table. The method includes the following steps. Selecting and inventorying the RFID tag based on the item code of RFID tag. Reading the first information table which includes first authentication information, first encrypted key and first other information, wherein the first authenticating information includes item code and user serial number, the first other information includes item serial number, first PC information, the first PC information indicates the length of the first information table, the first encrypted key includes encrypted second sub-information, the second sub-information indicates length of the second information table. Asking user to provide personal credentials. Asking user to enter an authentication password. Reading the tag identifier. Decrypting the first encrypted key to obtain the second sub-information. Verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system. Reading the second information table which includes second authentication information, second encrypted key and second other information, wherein the second authentication information includes savings account password, counter service password, credit account password, and compare failed count, the second other information includes savings account number and cash card information, the cash card information includes cash card balance monetary base, cash card balance, variable status code associated with cash card use, and cash card getting on station number. Comparing user's credentials, TIPS using the savings account number to access bank database device and obtaining from it user's information which includes user's personal identifier, account name, birthday, address, telephone number, and email address. Comparing the authentication password and the authentication information. After passing both the comparing user's credentials and passwords successfully, then proceeding to the following deposit or withdraw procedure by using the savings account number. Decrypting the encrypted connecting key to obtain word length of the third information table. Reading third information table based on the same word length, the third information table includes a transfer account number table, or a RFID access control table, or a receiving brief message phone number table, or a combination of the above. TIPS proceeding to withdraw or transfer transaction by using the savings account number and the transfer account number table, or proceeding to add withdraw amount to cash card balance of the RFID tag according to the cash card balance monetary base and recording the transaction, or proceeding to compose a brief message by combining time, location, and transaction summary, and transmit it to the receiving brief message phone number.
The foregoing and other features and advantages of the present invention will be more clearly understood through the following descriptions with reference to the drawings, wherein:
The present invention will now be described more specifically with reference to the following embodiments. It is to be noted that the following descriptions of preferred embodiments of this invention are presented herein for the purposes of illustration and description only; it is not intended to be exhaustive or to be limited to the precise form disclosed.
Please refer to
The RFID TIPS 22 includes an operating device 28, and a reader 221 coupled to the operating device 28. The operating device 28 includes a local computer 222, a keyboard 223 and a display unit 225, wherein the keyboard 223 includes a numerical key pad 2231. The reader 221 includes a reader antenna 224 and an interface and communication controlling circuit 2211 coupled to the reader antenna 224 and the operating device 28.
The local computer 222 connects to the reader 221 through reader connect cable 22D, connects to the keyboard 223 through keyboard cable 22E, connects to the display unit 225 through display unit cable 22F. In an embodiment, the local computer 222 is a computer, in a better embodiment, the local computer 222 can be a personal computer, a micro-controller, a micro-computer, or a workstation. In a better embodiment, the local computer 222 includes multiple USB ports, the reader connect cable 22D, the keyboard cable 22E and the display unit cable 22F all have USB heads connecting to the local computer 222. The TIPS obtains user entered password through local computer 222, keyboard cable 22E and keyboard 223. The TIPS sends visible output message through local computer 222 and display unit cable 22F to display unit 225 which includes a LCD unit, a LED display unit, or a printer unit and have the message printed. In a better embodiment, the TIPS sends hearable output message to a microphone in local computer 222, or an external speaker, or start an alarm. The reader 221 includes a reader antenna 224. The reader 221 can be a reader for transmitting and receiving UHF RFID message, the reader 221 includes an interface and communication controlling circuit 2211 which converts interrogator commands from the reader 221 for transmitting and receiving UHF signals through antenna 224 according to frame format defined in the UHF RFID communication interface protocol. In a better embodiment, the reader 221 can be a reader for transmitting and receiving HF RFID or other frequency message, for example at 433 MHz, the reader 221 includes an interface and communication controlling circuit which converts interrogator commands from the reader 221 for transmitting and receiving HF or other frequency signals through antenna 224 according to frame format defined in the HF or other frequency RFID communication interface protocol. In a better embodiment, the reader 221 can have both readers described above, the reader 221 includes an interface and communication controlling circuit which selects to convert interrogator commands from the reader 221 for transmitting and receiving UHF or HF signals through antenna 224 according to frame format defined in the UHF or HF RFID communication interface protocol. Between the antenna 224 and antenna 3J, it forms a RFID message channel 226. In an embodiment, the antenna 224 and antenna 3J can be RFID UHF antenna, the message channel 226 can be a several meter long (5 to 10 meter is long read distance) driveway, or a few decade meter long(above 100 meter is far read distance) air channel. In a better embodiment, the antenna 224 and antenna 3J can be RFID HF inductive coils, the message channel 226 can be a below 1 to 2 or several centimeter (below 5 to 10 centimeter is short read distance) insulating media including air and plastic material. In another better embodiment, the antenna 224 and antenna 3J can form a RFID UHF antenna and RFID HF inductive coils for transmitting and receiving UHF or HF signals. The TIPS 22 and RFID tag 3 can proceed with sending information to each other and authentication procedure through local computer 222, reader connecting cable 22D, reader 221, and RFID message channel 226. In a better embodiment, the reader 221 and antenna 224 can be configured in the same device which has a plain surface platform formed by plastic case for holding the RFID tag 3. Still in a better embodiment, network connection 21 connects the local computer 222 of the TIPS 22 and network connecting device 5, the TIPS 22 connects with internet 6 and mobile device 7 through the network connection 21 and the network connecting device 5, and the local computer 222, the reader 221, antenna 224, display unit 225, and the keyboard 223 are configured in the same device, for example, the device is an authenticating automatic teller machine (aATM), the aATM can use a card slot for inserting RFID tag 3, the aATM can also use a closed platform for holding RFID tag 3. In another better embodiment, the TIPS reads the tag serial number of RFID tag 3 and sends it to a label printer visibly, and has it printed on an adhesive label, and then attached to a product, for example a costume, or a packaging box, a packaging bag, or a pallet, for shipping management and stock inventory of a RFID product manufacturing authentication system, or security check against burglar of a RFID surveillance authentication system. In another better embodiment, the network connection 21 can be a radio network channel, the TIPS 22 connects internet 6 and mobile device 7 through the network connection 21 and the network connecting device 5 wirelessly, a wireless device is formed by configuring the local computer 222, the reader 221, antenna 224, display unit 225, and the keyboard 223 in the same device, the wireless device is a RFID authentication reader used by a guard on patrolling duty for reading RFID tag 3 fixed at the station, route mark, or patrolling point along a patrolling route, and composing a brief message by combining information related to the station, route mark, or patrolling point, patrolling route and time, and sending it to a RFID patrolling authentication system, for building a RFID real time locating authentication system (RTLAS) in a RFID patrolling information system. In another better embodiment, the wireless device includes a handle or stand formed by a plastic case, the wireless device is a handheld RFID authentication reader for store clerk reading RFID tag 3 attached to a merchant adhesively, and inquiring the merchant information. In another better embodiment, the TIPS 22 further connects with other device with USB port and connecting cable with USB head to receive purchasing information, the other device includes electronic scale, barcode scanner, network scanner, network camera, fluid meter, water flow meter, or GPS coordinate locating device, the purchasing information includes time, distance, weight, liquid flow volume, barcode, or GPS coordinates, and then converting the purchasing information to expense amount, then using finance cash authentication card of the present invention for paying the expense amount.
In an embodiment, the RFID AS 2 further includes 1 or multiple other processing system 24, network connection 23 connects the other processing system 24 and network connecting device 5, the other processing system 24 connects with internet 6 and mobile device 7 through the network connection 23 and the network connecting device 5. In a better embodiment, the network connection 23 can also be a wirelessly radio network channel, the other processing system 24 connects internet 6 and mobile device 7 through the network connection 23 and the network connecting device 5 wirelessly. The other processing system 24 can be the same processing system as the TIPS 22, which includes local computer 222, reader 221, antenna 224, display unit 225, and keyboard 223, can be used as a network used financial authenticating device (nuFAD), the reader 221 has a platform for holding RFID tag 3. In a better embodiment, the other processing system 24 can be a processing system including other device, the other device includes reader, electronic scale, barcode scanner, fluid meter, water flow meter, or GPS coordinate locating device. In another better embodiment, the other processing system 24 can only include local computer 222, display unit 225, and keyboard 223, used as the RFID authenticating system manager (ASM), or as the authenticating system kiosk ASK), or local database LDB), also used as an authenticating server, for example, printer server, mail server. The TIPS, LDB, and ASM in RFID AS 2 are differentiated by their names, code numbers, serial numbers, or IP addresses. After the operating system of local computer 222 is started, TIPS 22 will access the network resources, it can use user login and enter user password interface to manage user's access network for system safety consideration. The RFID IS 1 further includes a database device 4. Network connecting device 5 and network connection 21 connect a TIPS 22 and the database device 4, the network connecting device 5 and network connection 23 connect other processing system 24 and the database device 4. In an embodiment, the network connecting device 5 includes hub, repeater to connect 1 or multiple TIPS 22 or other processing system 24 by cable wire, thus the network connecting device 5, and 1 or multiple TIPS 22 or other processing system 24 form a local area network (LAN), the LAN connects a common database device 4 through internet 6, then the TIPS 22 can connect to the database device 4, make connection, and access information of the database device 4, the database device 4 includes multiple functions based on RFID business fields and applications which includes inquiring name or code number of RFID TIPS, name or code number of item code in RFID tag, name or code number of store and merchant, name or code number of travel route and station, name or code number of company or organization based on business unified serial number, name or code number and area, location, building and building floors and building rooms of community, account balance and account information based on savings account number. In another embodiment, the network connecting device 5 further includes a WiFi wireless access point (AP), connects 1 or multiple TIPS 22 or other processing system 24 wirelessly, thus the network connecting device 5, and 1 or multiple TIPS 22 or other processing system 24 form a wireless local area network (WLAN), the wireless WLAN further connects internet 6, mobile device 7, and common database device 4, then the TIPS 22 can connect to the database device 4 and the mobile device 7, make connection and access information of the database device 4, and send brief message, image, or both brief message and image via internet 6 to a display unit with IP address or a mobile device with a receiving brief message phone number. Still in another embodiment, the network connecting device 5 can connect 1 or multiple TIPS 22 or other processing system 24 both by cable wire and radio wirelessly, thus the network connecting device 5, and 1 or multiple TIPS 22 or other processing system 24 form a combined local area network (CLAN), the CLAN further connects to mobile device 7 and common database device 4 through internet 6, and then the TIPS 22 can connect with the internet 6, the database device 4 and the mobile device 7, make connection and access information of the database device 4, and/or send brief message, image, or both brief message and image to a display unit with IP address or a mobile device with a receiving brief message phone number. In a better embodiment, when user uses financial cash authentication card on aATM or nuFAD, the TIPS 22 will ask user to enter an authenticating password through the numerical key pad 2231, the first step authentication procedure of the present invention will authenticate the financial cash authentication card for anti-counterfeiting, after passing then read information of RFID tag 3 stored in the authentication card, which includes an authentication information, a savings account number, the second step authentication procedure will ensure the RFID tag 3 belonging to the same system (or the RFID tag 3 is compatible with the RFID TIPS 22), compare the authenticating password entered to the authentication information for authenticating the user's credentials, after passing then make connection to database device 4, use the savings account number to obtain account balance, follow a withdraw procedure and select the enabled monetary exchange function in the financial cash authentication card, then store the withdraw amount into the financial cash authentication card, and send the transaction summary to a mobile device with a receiving brief message phone number.
Please refer to
In an embodiment, as shown in
Please refer to
Please refer to
As shown in
As shown in
Please refer to
The RFID selecting enable function sub-code uses the 2 bits of item code[10:9] which defines combination of user selected enablers for a RFID business sub-code, for example, in an embodiment, in case that RFID business sub-code is finance, the item code[10:9] defines 4 combinations as: 00B indicating to enable finance, credit, counter service, access control, item level tracking, and pay cash, 01B indicating to enable finance, credit, counter service, pay cash, sending brief message, access control, and item level tracking, 10B indicating to enable finance, credit, counter service, pay cash, select monetary base for cash card balance, access control, and item level tracking, 11B indicating to enable finance, credit, counter service, pay cash, and system reserved functions.
The RFID function sub-code uses the 3 bits of item code[8:6] which includes integrated RFID functions in applying an RFID tag to a RFID business sub-code, for example, in an embodiment, in case that RFID business sub-code is 000B indicating finance, the item code[8:6] includes 8 combinations of integrated RFID functions as: 000B indicating finance, credit, counter service, pay cash, send brief message, and passive UHF long read distance, 001E indicating finance, credit, counter service, pay cash, send brief message, select monetary base for cash card balance, and passive UHF long read distance, 010E indicating finance, credit, counter service, pay cash, send brief message, and passive UHF short read distance, 011E indicating finance, credit, counter service, pay cash, send brief message, and passive UHF short read distance with high memory capacity, 100E indicating finance, credit, counter service, pay cash, send brief message, and HF short read distance, 101E indicating finance, credit, counter service, pay cash, send brief message, select monetary base for cash card balance, and HF short read distance, 110E indicating finance, credit, counter service, pay cash, send brief message, access control, item level tracking, and passive UHF long read distance, 111E indicating finance, credit, counter service, pay cash, send brief message, access control, item level tracking, and passive HF short read distance. In a better embodiment, in case that RFID business sub-code is 001E indicating transportation, the item code[8:6] includes 8 combinations of integrated RFID functions as: 000B indicating semi-passive UHF far read distance (50 to 100 meters) for locating while moving by high speed rail and buses, 001E indicating semi-passive UHF far read distance with high memory capacity (above 8K words), 010B indicating passive UHF long read distance (above 5 to 10 meters) for locating in patrol route and automatic smart parking lot, 011E indicating passive UHF long read distance with high memory capacity (above 64K words), 100E indicating passive UHF near read distance (below 50 to 100 millimeters) for automatic parking lot, 101E indicating passive UHF near read distance with high memory capacity, 110E indicating passive HF short read distance (below 5 to 10 millimeters) for access control and locating on the patrolling route, 111E indicating passive HF short read distance with high memory capacity. In another embodiment, in case that RFID business sub-code is 111E indicating product manufacturing, the item code[8:6] includes 8 combinations of integrated RFID functions as: 000B indicating finance, credit, counter service, pay cash, send brief message, item level tracking, and passive UHF long read distance, 001E indicating finance, credit, counter service, pay cash, send brief message, select monetary base for cash card balance, item level tracking, and passive UHF long read distance, 010E indicating finance, credit, counter service, pay cash, send brief message, item level tracking, and passive UHF short read distance, 011E indicating finance, credit, counter service, pay cash, send brief message, item level tracking, and passive UHF short read distance with high memory capacity, 100E indicating finance, credit, counter service, pay cash, send brief message, item level tracking, and HF short read distance, 101E indicating finance, credit, counter service, pay cash, send brief message, select monetary base for cash card balance, item level tracking, and HF short read distance, 110E indicating finance, credit, counter service, pay cash, send brief message, access control, item level tracking, and passive UHF long read distance, 111E indicating finance, credit, counter service, pay cash, send brief message, access control, item level tracking, and passive HF short read distance.
The RFID deployment country sub-code uses the 6 bits of item code[5:0] which defines 64 RFID deployment country and region according to the RFID deployment countries for a RFID business sub-code, for example, in an embodiment, the item code[5:0] defines RFID deployment country and region as: 00H indicating Australia region, 02H indicating China region, 20H indicating Taiwan region, 60H indicating USA region.
Based on the descriptions for item code 357 and its sub-codes as above, the TIPS 22 can proceed with the coding for item code[15:0], for example, in an embodiment, when item code[15:0] is 0981H, it indicates a nonconductive Type B Object B0 having a thickness with its shape as card jointed together with an RFID tag 3 thus forming an electronic card device which is a Type B Object Tagged device B1 as shown in
As shown in
As shown in
In a better embodiment, when TIPS 22 does not use the methods described above to build item code[15:0], item serial number[15:0], and user serial number[15:0] in the RFID tag 30, for example, user does not need the coding of RFID business sub-code, RFID device sub-code, RFID selecting enable function sub-code, RFID function sub-code, and RFID deployment country sub-code, then a 32 bit word organization identifier[31:0] can be built by concatenating two 16 bit words, item code[15:0] and the item serial number[15:0], which includes the name, code number, or business unified serial number of company or organization according to business area and business item. In a better embodiment, the item code 357 and the item serial number 358 are concatenated to include mixed code for an organization, sub-organizations, and buildings.
As shown in
In another better embodiment, the plural authentication method builds second authentication information 371 in second information table 37 of an RFID tag 30 required for the second authentication step in a cash authentication card (not shown), the second authentication information 371 only includes cash card balance 379, method of authenticating the cash card balance 379 is prior to the pay cash, TIPS 22 will first verify the cash card balance 379 after the expense amount is paid, if it is ≥0 ? Please refer to
Please refer to both
In
In
Please refer to
Furthermore, a set of alphanumeric numbers is used by the VState Code 37K to indicate the variable state WWK of the object 43. The variable state WWK of the object 43 is associated with the next processing and handling place or location within the M2PS MIS 9 where a RFID TIPS 22 is used for tracking a Type D OTD D1. For example, the VState Code 37K is equal to 0 to indicate a specific state that the object 43 is located in the final test area at a product manufacturing factory. The VState Code 37K is equal to 1 to indicate a specific state that the object 43 is located in the FG warehouse at the manufacturing factory. The VState Code 37K is equal to 2 to indicate a specific state that the object 43 is located in the shipping FG area at the manufacturing factory. The VState Code 37K is equal to 3 to indicate a specific state that the object 43 is located in the product receiving area at a supplier's plant. The VState Code 37K is equal to 4 to indicate a specific state that the object 43 is located in the shipping merchant area at the supplier's plant. The VState Code 37K is equal to 5 to indicate a specific state that the object 43 is located in the receiving merchant zone at a retail store or specialty counter. The VState Code 37K is equal to 6 to indicate a specific state that the object 43 is located in the merchant sales floor rack at the retail store or specialty counter. The VState Code 37K is equal to 7 to indicate a specific state that the object 43 is located in the sales counter at the retail store or specialty counter. The VState Code 37K is equal to 8 to indicate a specific state that the object 43 is located in the merchant post sales scene at a user or street vendor place.
Please refer to
Please refer to
Furthermore, a set of alphanumeric numbers is used by the VState Code 37K to indicate the variable state WWK of the object 43. The variable state WWK of the object 43 is associated with the next processing and handling weight within the SIS 98 where multiple of RFID TIPS 22 are used for tracking a Type D OTD D1. For example, the VState Code 37K is equal to 0 to indicate a specific state that the object 43 is ready to be used by user. The VState Code 37K is equal to 1 to indicate a specific state that no-load weight of the object 43 is measured at a retail store or specialty counter. The VState Code 37K is equal to 2 to indicate a specific state that full-load weight of the object 43 is measured at a retail store or specialty counter. The VState Code 37K is equal to 3 to indicate a specific state that the object 43 is located at sales counter at the retail store or specialty counter.
Measuring weight ready procedure: the RFID TIPS 22 authenticates the OTD D1, validates the OTD data 37N, and reset the weight, weight 1, weight2 in the Type D OTD D1 indicating the Type D OTD D1 is ready to start an measuring weight process, stores a number 1 into the VState Code of the OTD, and then end the communication dialog. User connect OTD D1 procedure: the RFID TIPS 22 authenticates the OTD D1, validates the OTD data 37N, stores a receiving merchant sales expense message phone number or email address into the Type D OTD D1 indicating the Type D OTD D1 is ready to receive an sales message for an measured merchant including weight and expense, stores a number 2 into the VState Code of the OTD, and then end the communication dialog. State 1 exception procedure: the TIPS 22 stores a number FF11H into the VState Code of the OTD indicating a system failure mode in State 1 has been detected which includes authenticating OTD is failed, validating OTD Data is failed, checking the Vstate Code of the OTD is not a valid number, and the TIPS 22 sends a SIS State 1 failure summary to the receiving SIS brief message phone number or email, and ends the communication dialog. Measuring and storing no_load weight1 procedure: the RFID TIPS 22 authenticates the OTD D1, validates the OTD data 37N, obtains an measured weight of the Type D OTD D1 indicating a no_load weight, weight1, stores the weight1 into the OTD D1, stores a number 3 into the VState Code of the OTD D1, and then end the communication dialog. State 2 exception procedure: the TIPS 22 stores a number FF11H into the VState Code of the OTD indicating a system failure mode in State 2 has been detected which includes authenticating OTD is failed, validating OTD Data is failed, checking the VState Code of the OTD is not a valid number, and the TIPS 22 sends a SIS State 2 failure summary to the receiving SIS brief message phone number or email, and ends the communication dialog. Measuring and storing weight2 procedure: the RFID TIPS 22 authenticates the OTD D1, validates the OTD data 37N, obtains a measured weight of the Type D OTD D1 indicating a full_load weight, weight2, stores the weight2 into the OTD D1, stores a number 4 into the VState Code of the OTD D1, and then end the communication dialog. Obtaining and storing weight procedure: the RFID TIPS 22 authenticates the OTD D1, validates the OTD data 37N, reads the weight1 and weight2 of the OTD D1 from the tag memory of the OTD D1, obtains an merchant net weight by subtracting weight1 from weight2, stores the merchant weight into the Type D OTD D1 as weight, stores a number 5 into the VState Code of the OTD D1, and then end the communication dialog. State 3 exception procedure: the TIPS 22 stores a number FF11H into the VState Code of the OTD indicating a system failure mode in State 3 has been detected which includes authenticating OTD is failed, validating OTD Data is failed, checking the VState Code of the OTD is not a valid number, and the TIPS 22 sends a SIS State 3 failure summary to the receiving SIS brief message phone number or email, and ends the communication dialog. Obtaining merchant sales expense procedure: the RFID TIPS 22 authenticates the OTD D1, validates the OTD data 37N, reads an merchant sales information and the weight of the OTD D1 from the tag memory of the OTD D1, the merchant sales information includes merchant name, merchant code, merchant unit price, total expense, country of origin, etc., obtains an merchant sales expense by multiplying the unit price by the weight, stores the merchant sales expense into the Type D OTD D1, stores a number 6 into the VState Code of the OTD D1, and then end the communication dialog. Initiating merchant sales procedure: the RFID TIPS 22 authenticates the OTD D1, validates the OTD data 37N, reads an merchant sales information and the weight of the OTD D1 from the tag memory of the OTD D1, the merchant sales information includes merchant name, merchant code, merchant unit price, total expense, country of origin, receiving merchant sales expense message phone number or email address, etc., obtains an merchant sales expense by multiplying the unit price by the weight, stores the merchant sales expense into the Type D OTD D1, sends a request to pay the merchant sales expense to the receiving merchant sales expense message phone number or email address, stores a number 7 into the VState Code of the OTD D1, and then end the communication dialog. Pay Merchant expense procedure: the RFID TIPS 22 authenticates the OTD D1, validates the OTD data 37N, and user examines the request to pay merchant sales expense, selects a way to pay the expense by sending back a positive acknowledge to the request, the RFID TIPS 22 stores a number 8 into the VState Code of the OTD D1, and then end the communication dialog. State 4 exception procedure: the TIPS 22 stores a number FF11H into the VState Code of the OTD indicating a system failure mode in State 4 has been detected which includes authenticating OTD is failed, validating OTD Data is failed, checking the VState Code of the OTD is not a valid number, and the TIPS 22 sends a SIS State 4 failure summary to the receiving SIS brief message phone number or email, and ends the communication dialog.
As shown in
Please refer to
Please refer to
Please refer to
Please refer to
As shown in
Please refer to
In
Please refer to
Please refer to
Please refer to
After ensuring the received inspection code RN1 is the same as first sent, the RFID tag 3 sends back the first information table 35 according to first PC information 351 which indicates a memory block RB1, and is received by the RFID TIPS 22 through the reader 221, the first information table 35 includes item code 357, item serial number 358, user serial number 355, first encrypted key 352, first PC information 351, and checksum code CRC (S509). The RFID TIPS 22 verifies “word number of the first information table 35”=“the length of first information table”? in a better embodiment, the length of first information table is 7, if it is false, indicating an exception occurred, then proceeds with step S512, if it is true, indicating the verification passed, then proceeds with step S511 (S510). The RFID TIPS 22 ensures both the RFID tag 3 and the RFID TIPS 22 belong to the same system by verifying item code 357, item serial number 358, and user serial number 355 in the first information table 35? If the verification is failed, then proceeds with step S512 to end the communication dialog, if the verification is passed, then continues with the authentication method shown in
Please refer to
Please refer to
After ensuring the received inspection code RN3 is the same as first sent, the RFID tag 3 sends back the first information table 35 in first memory block 36 according to first PC information 351 which indicates a memory block RB1, which is received by the RFID TIPS 22 through the reader 221, the first information table 35 includes item code 357, item serial number 358, user serial number 355, first PC information 351, first encrypted key 352, and checksum code CRC (S608). The RFID TIPS 22 verifies “word number of the first information table 35”=“the length of first information table”? if it is false, indicating an exception occurred, then proceeds with step S624, if it is true, indicating passed the verification, then proceeds with step S610, in a better embodiment, the length of first information table is 7 (S609). The RFID TIPS 22 issues instruction to read the tag identifier 31 (S610). The reader 221 sends a request to the RFID tag 3 for a new random or pseudo-random number by appending the inspection code RN3 to a Req_RN command (S611). After ensuring the received handle RN3 is the same as first sent, the RFID tag 3 sends back a random code RN4 to the reader 221, which is received by the RFID TIPS 22 as a handle of the following communication dialog, the random code RN4 is a 16-bit random or pseudo-random number RN164 (S612). The reader 221 reads the tag identifier 31 of the RFID tag 3 by appending the handle RN4 to the Read command (S613). After ensuring the received handle is the same as first sent, the RFID tag 3 sends back the tag identifier 31 by appending the handle RN4, which is received by the RFID TIPS 22, the tag identifier 31 includes a tag serial number 313 and a manufacturing identifier 314 (S614).
The RFID TIPS 22 decrypts the first encrypted key 352 by using the tag serial number 313 and the user serial number 355 to obtain the second sub-information 353, if “the second sub-information 353”=“the length of the second information table”, then the selected RFID tag 3 is ensured not a counterfeit tag, and belongs to the same system as the RFID TIPS 22 (S615).
The RFID TIPS 22 reads the second information table 39N in the RFID tag 3 through the reader 221 by appending the handle RN4 (S616). After ensuring the received handle RN4, the RFID tag 3 sends back the second information table 39N to the reader 221 by appending the handle RN4, which is received by the RFID TIPS 22, the second information table 39N was generated by a set of adjust ordering operation in
The RFID TIPS 22 gets a set of unadjust ordering operation by using the tag serial number 313, the second password mask 22A1 and the adjust table 22C, and obtains the original second information table 39 by performing the set of unadjust ordering operation, the second information table 39 includes second encrypted key 370 and second authentication information 371, the second authentication information 371 includes a cash card balance 379 (S618). The RFID TIPS 22 derives an after fees paid cash card balance by subtracting the expense amount from the cash card balance 379, and then verifies the fees paid cash card balance ≥0 ? If it is false, then proceeds with step S628, if it is true, then treating it as passing the comparing password successfully, and proceeds with step S620 (S619). The RFID TIPS 22 gets adjusted memory address of the cash card balance 379 after the adjust ordering operation, and stores the fees paid cash card balance at the adjusted memory address in the RFID tag 3 through the reader 221 by appending the handle RN4 (S620). After ensuring the received handle RN4, the RFID tag 3 uses the fees paid cash card balance to update the cash card balance 379, after the update is done successfully, then sends the handle RN4 to the reader 221 (S621). The reader 221 indicates the cash card balance 379 has been updated successfully (S622). The RFID TIPS 22 records the successful toll collecting event into database device 4 which includes the credit account number, date time, cash card balance, and toll amount, and executes an after the expense amount successfully deducted procedure, which includes sending a brief message or email to the receiving brief message phone number 370 as a proof of the transaction, in an embodiment, a RFID automated driveway management system can be used to open a gate at a long distance, and display or broadcast a passing through message in real time, in a better embodiment, a RFID automated power management system can be used to start a game machine (S623). The RFID TIPS 22 ends the communication dialog with the RFID tag 3 (S624). The reader 221 continues to select next RFID tag (S625). The RFID TIPS 22 disconnects the communication link to the reader 221 (S626). The reader 221 disconnects the RF power (S627). The RFID TIPS 22 displays insufficient cash card balance 379 on the display unit 225 (S628). The RFID TIPS 22 records the transaction in database device 4, and executes an after the expense amount unsuccessfully deducted procedure, in an embodiment, a RFID automated driveway management system can be used to display or broadcast a not passing through message in real time, in a better embodiment, an automated optical character recognition (OCR) system can be used for obtaining a license plate number of the vehicle, and record unsuccessful toll collecting event into database device 4, which includes the license plate number, the credit account number, date time, cash card balance, and insufficient toll amount, for sending next period account statement to the user, and proceeds with step S624, in a better embodiment, the RFID automated driveway management system can advance a fixed amount of cash from user's credit account number 376 through a cash advance procedure, and add the fixed amount into the cash card balance 379, also send a brief message or email to the receiving brief message phone number 370 as a proof, and proceeds with step S619 for toll collecting process again (S629).
As shown in
As shown in
According to the eighth embodiment of the present invention, RFID TIPS 22 builds item code[15:0], item serial number[15:0], and user serial number[15:0] in an RFID tag 30 can deviate from the method described for
According to the ninth embodiment of the present invention, RFID TIPS 22 builds item code[15:0], item serial number[15:0], and user serial number[15:0] in an RFID tag 30 further deviates from the method described for
In some embodiments provided according to the illustrations in
In some embodiments, The tag memory 34 stores a tag identifier 31 and an item information table 33. The tag identifier 31 includes a tag serial number 313 and a manufacturer identifier 314. The item information table 33 includes the information table 39, an information table 35, an item kill password 3B1, an item access password 3B2 and a specific portion 331.
In some embodiments, the information table 35 has a first storage capacity quantified with a first capacity value, and includes an authentication information 350, the encryption key 352 and an other information 354. The authentication information 350 includes an item code 357, a user serial number 355 and an item expiration date (not shown). The encryption key 352 includes a sub-information 353. The other information 354 includes an item serial number 358 and a protocol control (PC) information 351. For instance, the first capacity value is equal to a word length of the information table 35.
In some embodiments, the information table 39 has a second storage capacity quantified with a second capacity value, and includes a plurality of information elements [63:48]_374, [47:32]_374, . . . [15:0]_375, [15:0]_37E, . . . [15:0]_37K and [15:0]_37J with a first total information element number, wherein the predetermined value is equal to one of the second capacity value and the first total information element number. The plurality of information elements [63:48]_374, [47:32]_374, . . . [15:0]_375, [15:0]_37E, . . . [15:0]_37K and [15:0]_37J include an authentication information 371, a communication target indicator 37S and an other information 372, and are arranged according to a first order. The other information 372 includes a start control table 3721. For instance, the second capacity value is equal to a word length of the information table 39.
In some embodiments, the specific portion 331 of the item information table 33 records an application code information 332. The sub-information 353 represents the predetermined value. The communication target indicator 37S includes at least one of a phone number and an email address, and is used to link to a specific device 79 by an RFID tag item processing system 22. The RFID tag 3 is applied to a specific application function 41, wherein the specific application function 41 uses the application code information 332, and controls an actuating mechanism 42 near to an object 43 using the RFID tag. The item code 357 is associated with the specific application function 41.
In some embodiments, the RFID tag item processing system 22 generates a transaction message G1 for the specific application function 41 according to the application code information 332 after the authentication phase, and sends the transaction message G1 to the specific device 79 according to the communication target indicator 37S. For instance, the RFID tag item processing system 22 performs the specific application function 41 to generate the transaction message G1.
In some embodiments, the information table 39 is determined according to the tag serial number 313, a password mask 22A1 and an information table 49, wherein the information table 49 includes a plurality of information elements 491, 492, . . . 49P with a second total information element number equal to the first total information element number, the plurality of information elements [63:48]_374, [47:32]_374, . . . [15:0]_375, [15:0]_37E, . . . [15:0]_37K and [15:0]_37J have an information content the same as that of the plurality of information elements 491, 492, . . . 49P, and the plurality of information elements 491, 492, . . . 49P are arranged according to a second order different from the first order.
In some embodiments, the encryption key 352 is determined according to the sub-information 353 and at least one of the tag serial number 313 and the user serial number 355. The item kill password 3B1 and the item access password 3B2 are determined according to the tag serial number 313, a password mask 2271 and a hash table 229.
In some embodiments, the information table 39 is transformed into an information table 59 according to the tag serial number 313, the password mask 22A1 and the information table 39 after the authentication phase, wherein the information table 59 includes a plurality of information elements respectively the same as the plurality of information elements 491, 492, . . . 49P, and the plurality of information elements of the information table 59 are arranged according to a third order the same as the second order.
In some embodiments, the information table 39 starts to be stored in a memory block RB2 in the tag memory 34 at a first specific time. The memory block RB2 originally stores an information table 69 at a second specific time before the first specific time. The RFID tag item processing system 22 reads the information table 69 at a third specific time between the first and the second specific times, and configures the read information table of the information table 69 to form the information table 49.
In some embodiments, the start control table 3721 of the information table 39 includes a plurality of bits respectively used to control a plurality of start signals, and is included in the application code information 332. The specific application function 41 is an access control function and uses the start control table. The RFID tag item processing system 22 performs the specific application function 41 according to the item code 357 after the authentication phase. The plurality of bits include a specific bit used to control a specific one of the plurality of start signals, wherein the specific start signal controls the actuating mechanism 42 to determine whether the object 43 is allowed to pass through a specific access control area handled by the actuating mechanism 42. In some embodiments, the specific application function 41 generates the plurality of start signals respectively in response the plurality of bits.
In some embodiments, the specific bit represents one of an enabling state and a disabling state. When the specific bit represents the enabling state, the actuating mechanism 42 allows the object 43 to pass through the specific access control area. When the specific bit represents the disabling state, the actuating mechanism 42 disallows the object 43 to pass through the specific access control area.
In some embodiments, the specific bit is detected to generate a detected bit. The RFID tag item processing system 22 generates the transaction message G1 according to the detected bit so as to send the transaction message G1 to the specific device 79. The encryption key 352 is decrypted to determine whether the sub-information 353 represents the predetermined value in order that the RFID tag item processing system 22 authenticates the RFID tag 3 for a confirmation that the RFID tag 3 is compatible with the RFID tag item processing system 22 and is an anti-counterfeiting tag.
In some embodiments provided according to the illustrations in
In some embodiments, the system 20 is an RFID tag item processing system 22. The operation device 28 is an RFID tag item operation device, and includes a local computer 222, a keyboard 223 and a display unit 225. The local computer 222 obtains the specific identifier 45 from the RFID tag 3 through the reader 221, provides the password mask 22A1 and the information table 49, adjusts the first order according to the specific identifier 45 and the password mask 22A1 to generate the information table 39, and writes the information table 39 to the RFID tag 3 via the reader 221. The keyboard 223 is coupled to the local computer 222.
In some embodiments, the display unit 225 is coupled to the local computer 222, wherein the local computer 222 controls the reader 221, the keyboard 223 and the display unit 225, and controls the RFID tag 3 via the reader 221. For instance, the keyboard 223 includes a numerical key pad 2231 controlled by the local computer 222. The reader 221 includes a reader antenna 224 and an interface and communication controlling circuit 2211 coupled to the reader antenna 224 and the local computer 222, wherein the reader antenna 224 includes at least one of a UHF antenna and an HF inductive coil.
In some embodiments, the operation device 28 further includes an actuating mechanism 42 coupled to the local computer 222, wherein the local computer 222 controls the actuating mechanism 42. In some embodiments, the operation device 28 performs a specific application function 41 by reading the RFID tag 3 via the reader 221; and the local computer 222 controls the specific application function 41. In some embodiments, the actuating mechanism 42 is separate from the operation device 28, and is remotely controlled by the operation device 28.
In some embodiments, the operation device 28 writes the information table 39 to the RFID tag 3 via the reader 221. The RFID tag 3 includes a tag memory 34, a tag antenna 3J and an interface and communication controlling circuit 3K coupled to the tag antenna 3J and the tag memory 34, wherein the tag antenna 3J includes at least one of a UHF antenna and an HF inductive coil. The tag memory 34 stores a tag identifier 31 and an item information table 33. The tag identifier 31 includes a tag serial number 313 and a manufacturer identifier 314, wherein the specific identifier 45 is the tag serial number 313. The item information table 33 includes the information table 39, an information table 35, an item kill password 3B1, an item access password 3B2 and a specific portion 331.
In some embodiments, in a configuration phase, the operation device 28 determines the item information table 33, and causes the reader 221 to write the item information table 33 to the RFID tag 3.
In some embodiments, the information table 35 has a first storage capacity quantified with a first capacity value, and includes an authentication information 350, an encryption key 352 and an other information 354. The authentication information 350 includes an item code 357, a user serial number 355 and an item expiration date (not shown). The encryption key 352 includes a sub-information 353. The other information 354 includes an item serial number 358 and a PC information 351. The plurality of information elements 491, 492, . . . 49P have a first total information element number. For instance, the first capacity value is equal to a word length of the information table 35.
In some embodiments, the information table 39 has a second storage capacity quantified with a second capacity value, and includes a plurality of information elements [63:48]_374, [47:32]_374, . . . [15:0]_375, [15:0]_37E, . . . [15:0]_37K and [15:0]_37J with a second total information element number equal to the first total information element number, wherein the plurality of information elements 491, 492, . . . 49P have an information content the same as that of the plurality of information elements [63:48]_374, [47:32]_374, . . . [15:0]_375, [15:0]_37E, . . . [15:0]_37K and [15:0]_37J, and the plurality of information elements [63:48]_374, [47:32]_374, . . . [15:0]_375, [15:0]_37E, . . . [15:0]_37K and [15:0]_37J are arranged according to a second order different from the first order. For instance, the second capacity value is equal to a word length of the information table 39.
In some embodiments, the predetermined value is equal to one of the second capacity value and the second total information element number. The plurality of information elements [63:48]_374, [47:32]_374, . . . [15:0]_375, [15:0]_37E, . . . [15:0]_37K and [15:0]_37J include an authentication information 371, a communication target indicator 37S and an other information 372. The other information 372 includes a start control table 3721. The specific portion 331 of the item information table 33 records an application code information 332.
In some embodiments, the operation device 28 stores a system maintenance information G3, wherein the system maintenance information G3 includes a computer type, an authentication type, the information table 49, a specific system constant, the predetermined value, the first and the second capacity values, the password mask 22A1, a password mask 2271, a hash table 229 and an order adjustment table 22C.
In some embodiments, the sub-information 253 represents one of the predetermined value and the specific system constant. The communication target indicator 37S includes at least one of a phone number and an email address, and is used to link to a specific external device 79. The specific external device 79 is a mobile device. The RFID tag 3 is applied to a specific application function 41.
In some embodiments, the specific application function 41 uses the application code information 332, controls an actuating mechanism 42 near to an object 43 using the RFID tag 3, and includes at least one selected from a group consisting of a finance function, an access control function, a cash paying function, a credit function, a counter service function, a transport charge function, a communication function, a logistics function, a production management function, a work attendance management function, an authentication function, a goods sale management function, a parking charge function, a supply chain function, an item level tracking function, an assets management function and a combination thereof.
In some embodiments, the operation device 28 authenticates the RFID tag 3 in an authentication phase after the configuration phase, generates a transaction message G1 according to the application code information 332 by using the specific application function 41 after the authentication phase, and sends the transaction message G1 to the specific external device 79 according to the communication target indicator 37S.
In some embodiments, the information table 49 is an original information table. The operation device 28 generates the information table 39 according to the specific identifier 45, the password mask 22A1 and the information table 49. The specific identifier 45 has a binary value having M bits, wherein M>1. The operation device 28 selects N bits from the M bits according to the password mask 22A1 to generate a value K81, wherein N>1. The operation device 28 encodes the value K81 to generate a control signal K82. The operation device 28 performs an order adjustment operation (such as 22C2) according to the order adjustment table 22C, the information table 49 and the control signal K82 to generate the information table 39; for instance, the information table 39 is equal to the information table 392.
In some embodiments, the operation device 28 performs an authentication operation to authenticate the RFID tag 3 in the authentication phase. The authentication operation reads the information table 35 of the RFID tag 3 via the reader 221. The authentication operation decrypts the encryption key 352 to determine whether the sub-information 353 represents one of the predetermined value and the specific system constant in order that the operation device 28 authenticates the RFID tag 3 for a confirmation that the RFID tag 3 is compatible with the system 20 and is an anti-counterfeiting tag. When the sub-information 353 represents one of the predetermined value and the specific system constant, the operation device 28 confirms that the authentication operation passes. The operation device 28 reads the information table 39 of the RFID tag 3 via the reader 221 after the RFID tag 3 passes the authentication operation.
In some embodiments, the operation device 28 transforms the information table 39 into an information table 59 according to the specific identifier 45, the password mask 22A1 and the information table 39 by performing a reverse order adjustment operation, wherein the information table 59 includes a plurality of information elements having an information content the same as that of the plurality of information elements 491, 492, . . . 49P, and the plurality of information elements of the information table 59 are arranged according to a third order the same as the first order. The operation device 28 performs the reverse order adjustment operation according to the order adjustment table 22C, the information table 39 and the control signal K82 to generate the information table 59.
In some embodiments, the information table 39 starts to be stored in a memory block RB2 in the tag memory 34 at a first specific time. The memory block RB2 originally stores an information table 69 at a second specific time before the first specific time. The operation device 28 reads the information table 69 via the reader 221 at a third specific time between the first and the second specific times, and configures the read information table of the information table 69 to form the information table 49.
In some embodiments, the item code 357 indicates the specific application function 41 for the RFID tag 3 to be applied to. The predetermined RFID function unit includes at least one selected from a group consisting of the finance function, the credit function, the counter service function, the cash paying function, a short-message sending function, an email sending function, a monetary base selecting function for a cash card balance, the access control function, the item level tracking function, a specific UHF access distance operation function, a specific HF access distance operation function and a combination thereof.
The specific UHF access distance operation function is one selected from a group consisting of a passive UHF long access distance operation function, a passive UHF short access distance operation function, a passive UHF short access distance operation function with a relatively high memory capacity, an HF short access distance operation function, a semi-passive UHF long access distance operation function, a semi-passive UHF far access distance operation function for positioning while the RFID tag 3 moves, a semi-passive UHF far access distance operation function with a relatively high memory capacity, a passive UHF long access distance operation function for positioning, a passive UHF long access distance operation function with a relatively high memory capacity, a passive UHF near access distance operation function, a passive UHF near access distance operation function with a relatively high memory capacity.
The specific HF access distance operation function is one selected from a group consisting of an HF short access distance operation function, an HF short access distance operation function with a relatively high memory capacity, a passive HF short access distance operation function for an access control and positioning, and a passive HF short access distance operation function with a relatively high memory capacity.
In some embodiments, the operation device 28 determines the encryption key 352 according to the sub-information 353 and at least one of the tag serial number 313 and the user serial number 355 by using a specific operation, wherein the specific operation is one selected from a group consisting of a first operation, a second operation, a third operation and a fourth operation. The first operation sets the encryption key 352 to be equal to a first sum of the tag serial number 313, the user serial number 355 and the sub-information 353. The second operation sets the encryption key 352 to be equal to a second sum of the tag serial number 313 and the sub-information 353. The third operation sets the encryption key 352 to be equal to a result obtained from an arithmetic operation applied to the sub-information 353 and at least one of the tag serial number 313 and the user serial number 355. The fourth operation extracts a specific number of bits from one selected from a group consisting of the first sum, the second sum and the result to generate a binary value and sets the encryption key 352 to be equal to the binary value.
In some embodiments, the operation device 28 determines the item kill password 3B1 and the item access password 3B2 according to the tag serial number 313, the password mask 2271 and the hash table 229. The tag serial number 313 has a binary value having M bits, wherein M>1. the item kill password 3B1 and the item access password 3B2 are determined in one of a first state and a second state.
When the item kill password 3B1 and the item access password 3B2 are determined in the first state, there are the following operations: the operation device 28 selects a specific bit from the binary value according to the password mask 2271 to generate a value K71; the operation device 28 encodes the value K71 to generate a control signal K72; when the control signal K72 carries an odd number, the operation device 28 performs an encryption operation 2291 according to the hash table 229 and the odd number to generate a kill password value 3B11 and a access password value 3B21, and sets the item kill password 3B1 and the item access password 3B2 to be respectively equal to the kill password value 3B11 and the access password value 3B21; when the control signal K72 carries an even number, the operation device 28 performs a encryption operation 2292 according to the hash table 229 and the even number to generate a kill password value 3B12 and a access password value 3B22, and sets the item kill password 3B1 and the item access password 3B2 to be respectively equal to the kill password value 3B12 and the access password value 3B22.
When the item kill password 3B1 and the item access password 3B2 are determined in the second state, there are the following operations: the operation device 28 selects N bits from the M bits according to the password mask 2271 to generate a value K75, wherein N>1; the operation device 28 encodes the value K75 to generate a control signal K76; the operation device 28 performs an encryption operation 2293 according to the hash table 229 and the control signal K76 to generate a kill password value 3B13 and a access password value 3B23; and the operation device 28 sets the item kill password 3B1 and the item access password 3B2 to be respectively equal to the kill password value 3B13 and the access password value 3B23.
In some embodiments, the authentication information 371 includes a cash card balance 379 included in the application code information 332. The specific application function 41 is the cash paying function. The operation device 28 uses a default target indicator to preset the communication target indicator 37S before the configuration phase. The operation device 28 receives a first user input to determine the communication target indicator 37S in the configuration phase. The operation device 28 receives a second user input to change the communication target indicator 37S after the RFID tag 3 is authenticated to be genuine and compatible with the system 20. For instance, the operation device 28 receives the first and the second user input via the keyboard 223.
In some embodiments, the operation device 28 performs the specific application function 41 via the reader 221 according to the item code 357 after the authentication phase. The operation device 28 updates the cash card balance 379 of the RFID tag 3 via the reader 221 by performing the specific application function 41 to result in a cash card balance update, and generates the transaction message G1 according to the cash card balance update so as to send the transaction message G1 to the specific external device 57.
In some embodiments, the start control table 3721 of the information table 39 includes a plurality of bits respectively used to control a plurality of start signals, and is included in the application code information 332. The specific application function 41 is the access control operation, and uses the start control table 3721. The plurality of bits include a specific bit used to control a specific one of the plurality of start signals, wherein the specific start signal controls the actuating mechanism 42 to determine whether the object 43 is allowed to pass through a specific access control area handled by the actuating mechanism 42.
In some embodiments, the specific bit represents one of an enabling state and a disabling state. When the specific bit represents the enabling state, the actuating mechanism 42 allows the object 43 to pass through the specific access control area. When the specific bit represents the disabling state, the actuating mechanism 42 disallows the object 43 to pass through the specific access control area. The operation device 28 detects the specific bit via the reader 221 to generate a detected bit, and generates the transaction message G1 according to the detected bit so as to send the transaction message G1 to the specific external device.
In some embodiments, the tag memory 34 further stores a measurable parameter information 47, wherein the measurable parameter information 47 is included in the application code information 332, and includes at least one selected from a group consisting of a used time, a distance, a location, a weight, a traffic flow, a cash card balance, a public transport station number, and an airline landing location number. The specific application function 41 is the transport charge function, and uses the measurable parameter information 47.
In some embodiments, the operation device 28 converts the measurable parameter information 47 into a charge amount by performing the specific application function 41 to make a transaction, and generates the transaction message G1 according to the transaction so as to send the transaction message G1 to the specific external device 79, wherein the system 20 has a system information, and the transaction message G1 is generated further according to the system maintenance information G3 and the system information.
In some embodiments provided according to the illustrations in
Please refer to
The system 201 for securing the electronic tag 301 includes a reader 221 and an operation device 28. The operation device 28 is coupled to the reader 221, and is configured via the reader 221 to authenticate the electronic tag 301 by decrypting the encryption key 352 in the authentication phase, and read the information table 39 according to the predetermined value VP11 after the authentication phase. For instance, the electronic tag 301 includes a tag memory 34, which stores the encryption key 352 and the information table 39.
Please additionally refer to
The local computer 222 is configured to obtain the encryption key 352 from the electronic tag 301 through the reader 221, authenticate the electronic tag 301 by decrypting the obtained encryption key 352 in the authentication phase, and read the information table 39 from the electronic tag 301 via the reader 221 after the authentication phase. The keyboard 223 is coupled to the local computer 222. The display unit 225 is coupled to the local computer 222. The local computer 222 controls the reader 221, the keyboard 223 and the display unit 225, and is used to communicate with the electronic tag 301 via the reader 221. The reader 221 includes a reader antenna 224 and an interface and communication controlling circuit 2211 coupled to the reader antenna 224 and the local computer 222. The reader antenna 224 includes at least one of a UHF antenna and an HF inductive coil.
In some embodiments provided according to the illustration in
In some embodiments proposed according to the illustration in
Please refer to
The electronic tag 301 is coupled to an object 43 and stores a first communication target indicator 37S and a specific control bit 37211. The first communication target indicator 37S is configured to indicate a specific external device 79. The specific control bit 37211 represents one of a first state KA11 and a second state KA21. The first state KA11 is that the object 43 has been authorized to enter a specific access control area HQ11 coupled to an electric device 67. The second state KA21 is that the object 43 has been prohibited to enter the specific access control area HQ11.
The system 202 for securing the electronic tag 301 includes a reader 221 and an operation device 28. The operation device 28 is coupled to the reader 221, and performs an access control function 411 of the specific access control area HQ11 by using the reader 221 and the electric device 67. The electronic tag 301 is applied to the access control function 411. Under a condition that the specific control bit 37211 satisfies a specific condition, the operation device 28, via the reader 221, generates an access message GD11 for the access control function 411 according to the specific control bit 37211, and sends the access message GD11 to the specific external device 79 according to the first communication target indicator 37S. For instance, the electronic tag 301 includes a tag memory 34, which stores the first communication target indicator 37S and the specific control bit 37211.
Please additionally refer to
The local computer 222 is coupled to the electric device 67, performs the access control function 411 of the specific access control area HQ11 by using the reader 221 and the electric device 67, generates the access message GD11 for the access control function 411 according to the specific control bit 37211 under a condition that the specific control bit 37211 satisfies the specific condition, and sends the access message GD11 to the specific external device 79 according to the first communication target indicator 37S. The system 202 further includes the electric device 67. For instance, the electric device 67 is coupled to the operation device 28. For instance, the electric device 67 is coupled to the local computer 222, and includes an actuating mechanism 42 used to control the specific access control area HQ11.
In some embodiments, the electronic tag 301 has a user 901, or is used by the user 901. The object 43 is one of the user 901 and an application device 902. The specific condition is one selected from a plurality of conditions including a first condition, a second condition and a third condition. The first condition is that the specific control bit 37211 represents the first state KA11. The second condition is that the specific control bit 37211 represents the second state KA21. The third condition is that the specific control bit 37211 represents one of the first and the second states KA11 and KA21. For instance, the electronic tag 301 is one selected from a group consisting of a passive tag, a semi-passive tag and an active tag.
Under a condition that the specific control bit 37211 satisfies the third condition, a content of the access message GD11 is dependent on a bit value of the specific control bit 37211. Via the reader 221, the local computer 222 controls the electric device 67 according to the specific control bit 37211 to cause the object 43 to be in a specific state KAA1 represented by the specific control bit 37211. The specific control bit 37211 corresponds to a specific start signal JN11, and is one selected from a plurality of control bits 37211, 37212, . . . stored in the electronic tag 301, wherein the plurality of control bits 37211, 37212, . . . is included in a start control table 3721. For instance, the specific control bit 37211 is arranged in the start control table 3721 according to a specific bit serial number. For instance, the local computer 222 provides the specific start signal JN11.
Under a condition that the specific control bit 37211 represents the first state KA11, the specific state KAA1 is the first state KA11, and the local computer 222, via the reader 221, controls the specific start signal JN11 to start the electric device 67 according to the selected specific control bit 37211, wherein the electric device 67 is started to authorize the object 43 to enter the specific access control area HQ11. Under a condition that the specific control bit 37211 represents the second state KA21, the specific state KAA1 is the second state KA21, and the local computer 222, via the reader 221, controls the electric device 67 to generate a warning signal WN11 used to indicate that the object 43 is prohibited to enter the specific access control area HQ11.
In some embodiments, the reader 221 is located at a reader location LR11. The reader location LR11 is coupled to the specific access control area HQ11, and is represented by a location code CL11 corresponding to the specific control bit 37211. The local computer 222 obtains the location code CL11 and the start control table 3721 coming from the electronic tag 301 when the electronic tag 301 is applied to the access control function 411 via the reader 221. For instance, the location code CL11 is a location serial number. The location code CL11 and the specific bit serial number have a specific mathematical relationship therebetween. For instance, the location code CL11 can be configured to be the same as or different from the specific bit serial number.
The local computer 222 selects the specific control bit 37211 from the plurality of control bits 37211, 37212, . . . of the obtained start control table 3721 according to the obtained location code CL11. For instance, the local computer stores the location code CL11, and obtains the stored location code CL11 when the electronic tag 301 is applied to the access control function 411. At a time desired by the user 901, the local computer 222 replaces the stored first communication target indicator 37S with a second communication target indicator 37U desired by the user 901 via the reader 221, wherein the first and the second communication target indicators 37S and 37U are different. For instance, the local computer 222 obtains the specific bit serial number according to the obtained location code CL11 and the specific mathematical relationship, and selects the specific control bit 37211 from the plurality of control bits 37211, 37212, . . . of the obtained start control table 3721 according to the obtained specific bit serial number.
In some embodiments provided according to the illustrations in
The electronic tag 301 is applied to an access control function 411 of the specific access control area HQ11 performed by the system 202 using the electric device 67. Under a condition that the specific control bit 37211 satisfies a specific condition, the specific control bit 37211 is used by the system 202 to generate an access message GD11 for the access control function 411, and the first communication target indicator 37S is used by the system 202 to send the access message GD11 to the specific external device 79.
In some embodiments proposed according to the illustrations in
The method includes the following steps. An access control function 411 of the specific access control area HQ11 is performed by using the electric device 67. The electronic tag 301 is applied to the access control function 411. Under a condition that the specific control bit 37211 satisfies a specific condition, an access message GD11 is generated for the access control function 411 according to the specific control bit 37211. The access message GD11 is sent to the specific external device 79 according to the first communication target indicator 37S.
In some embodiments, the electronic tag 301 has a user 901, and the object 43 is one of the user 901 and an application device 902. The specific condition is one selected from a plurality of conditions including a first condition, a second condition and a third condition. The first condition is that the specific control bit 37211 represents the first state KA11. The second condition is that the specific control bit 37211 represents the second state KA21. The third condition is that the specific control bit 37211 represents one of the first and the second states KA11 and KA21.
Under a condition that the specific control bit 37211 satisfies the third condition, a content of the access message GD11 is dependent on a bit value of the specific control bit 37211. The specific control bit 37211 corresponds to a specific start signal JN11, and is one selected from a plurality of control bits 37211, 37212, . . . stored in the electronic tag 301, wherein the plurality of control bits 37211, 37212, . . . is included in a start control table 3721. The method further includes a step: the electric device 67 is controlled according to the selected specific control bit 37211 to cause the object 43 to be in a specific state KAA1 represented by the specific control bit 37211.
In some embodiments, the step of controlling the electric device 67 includes the following sub-steps. Under a condition that the specific control bit 37211 represents the first state KA11, the specific start signal JN11 is controlled to start the electric device 67 according to the specific control bit 37211, wherein the electric device 67 is started to authorize the object 43 to enter the specific access control area HQ11. Under a condition that the specific control bit 37211 represents the second state KA21, the electric device 67 is controlled to generate a warning signal WN11 used to indicate that the object 43 is prohibited to enter the specific access control area HQ11.
The method further includes the following steps. A reader 221 is provided for reading the first communication target indicator 37S and the specific control bit 37211, wherein the reader 221 is located at a reader location LR11, and the reader location LR11 is represented by a location code CL11 corresponding to the specific control bit 37211. The location code CL11 and the start control table 3721 coming from the electronic tag 301 is obtained when the electronic tag 301 is applied to the access control function 411 by using the reader 221.
The method further includes the following steps. The specific control bit 37211 is selected from the plurality of control bits 37211, 37212, . . . of the obtained start control table 3721 according to the obtained location code CL11. At a time desired by the user 901, the stored first communication target indicator 37S is replaced with a second communication target indicator 37U desired by the user 901 via the reader 221, wherein the first and the second communication target indicators 37S and 37U are different.
Please refer to
The system 203 for securing the electronic device 306 having a specific identifier 45 includes an operation device 28 and a reader 521 coupled to the operation device 28. The operation device 28 provides a password mask 22A1 and a information table 49, wherein the information table 49 includes a plurality of information elements 491, 492, . . . 49P arranged according to a first order YP11. The operation device 28 adjusts the first order YP11 according to the specific identifier 45 and the password mask 22A1 to generate an information table 39.
Please additionally refer to
The display unit 225 is coupled to the local computer 222. The local computer 222 controls the reader 521, the keyboard 223 and the display unit 225, and is used to communicate with the electronic device 306 via the reader 521. For instance, the keyboard 223 includes a numerical key pad 2231 controlled by the local computer 222. The reader 521 includes a communication interface circuit 5212 and a control circuit 5215 coupled to the communication interface circuit 5212 and the local computer 222, and can be the same as the reader 221. The control circuit 5215 controls the communication interface circuit 5212. The communication interface circuit 5212 is used to communicate with the electronic device 306.
In some embodiments, the operation device 28 further includes an electric device 67 coupled to the local computer 222, wherein the local computer 222 controls the electric device 67. In some embodiments, the operation device 28 performs a specific application function 41 to obtain an application code information 332 by reading the electronic device 306 via the reader 521. The local computer 222 performs the specific application function 41 by using the obtained application code information 332. In some embodiments, the electric device 67 is separate from the operation device 28, and is remotely controlled by the operation device 28. For instance, the electric device 67 is coupled to the operation device 28, and includes an actuating mechanism 42.
The electronic device 306 includes a device memory 336, a communication interface circuit 337 and a control circuit 338 coupled to the communication interface circuit 337 and the device memory 336. The control circuit 338 controls the communication interface circuit 337 and the device memory 336. The communication interface circuit 337 is used to communicate with the communication interface circuit 5212. The local computer 222 writes the information table 39 to the device memory 336 through the reader 521, the communication interface circuit 337 and the control circuit 338. For instance, the electronic device 306 is one selected from a group consisting of a passive device, a semi-passive device and an active device. For instance, the reader 521 is used to communicate with the electronic device 306 under a wire or wireless link between the communication interface circuit 5212 and the communication interface circuit 337.
The device memory 336 stores a device identifier 31 and an item information table 33. The device identifier 31 includes a device serial number 313 and a manufacturer identifier 314, wherein the specific identifier 45 is one of the device serial number 313 and the device identifier 31. The item information table 33 includes the information table 39, an information table 35, an item kill password 3B1, an item access password 3B2 and a specific portion 331. For instance, the electronic device 306 is identified by one of the device identifier 31 and the specific identifier 45, or is identified based on the specific identifier 45.
In some embodiments, in a configuration phase, the local computer 222 determines the item information table 33, and causes the reader 521 to write the item information table 33 to the electronic device 306. In addition, the device identifier 31 and the device serial number 313 can be a tag identifier and a tag serial number, respectively. The device memory 336 can be the same as the tag memory 34.
The information table 35 has a first storage capacity quantified with a first capacity value, and includes an authentication information 350, an encryption key 352 and an other information 354. The authentication information 350 includes an item code 357, a user serial number 355 and an item expiration date (not shown). The encryption key 352 includes a sub-information 353. The other information 354 includes an item serial number 358 and a PC information 351. The plurality of information elements 491, 492, . . . 49P have a first total information element number. For instance, the first capacity value is equal to a word length of the information table 35.
In some embodiments, the information table 39 has a second storage capacity AT11 quantified with a second capacity value, and includes a plurality of information elements [63:48]_374, [47:32]_374, . . . [15:0]_375, [15:0]_37E, . . . [15:0]_37K and [15:0]_37J with a second total information element number equal to the first total information element number, wherein the plurality of information elements 491, 492, . . . 49P have an information content the same as that of the plurality of information elements [63:48]_374, [47:32]_374, . . . [15:0]_375, [15:0]_37E, . . . [15:0]_37K and [15:0]_37J, and the plurality of information elements [63:48]_374, [47:32]_374, . . . [15:0]_375, [15:0]_37E, . . . [15:0]_37K and [15:0]_37J are arranged according to a second order different from the first order YP11. For instance, the second capacity value is equal to a word length of the information table 39.
The encryption key 352 is derived from a predetermined value VP11. The predetermined value VP11 is equal to one of the second capacity value and the second total information element number. The plurality of information elements [63:48]_374, [47:32]_374, . . . [15:0]_375, [15:0]_37E, . . . [15:0]_37K and [15:0]_37J include an authentication information 371, a communication target indicator 37S and an other information 372. The other information 372 includes a start control table 3721. The specific portion 331 of the item information table 33 records an application code information 332.
In some embodiments, the local computer 222 stores a system maintenance information G3, wherein the system maintenance information G3 includes a computer type, an authentication type, the information table 49, a specific system constant, the predetermined value, the first and the second capacity values, the password mask 22A1, a password mask 2271, a hash table 229 and an order adjustment table 22C.
The sub-information 253 represents one of the predetermined value and the specific system constant. The communication target indicator 37S includes at least one of a phone number and an email address, and is used to link to a specific external device 79. The specific external device 79 is a mobile device. The electronic device 306 is applied to a specific application function 41. The item code 357 indicates the specific application function 41 for the electronic device 306 to be applied to.
In some embodiments, the local computer 222 is configured to perform the specific application function 41 for using the application code information 332, and control the actuating mechanism 42 near to an object 43 using the electronic device 306. The specific application function 41 includes at least one selected from a group consisting of a finance function, an access control function, a cash paying function, a credit function, a counter service function, a transport charge function, a communication function, a logistics function, a production management function, a work attendance management function, an authentication function, a goods sale management function, a parking charge function, a supply chain function, an item level tracking function, an assets management function and a combination thereof.
The local computer 222 authenticates the electronic device 306 in an authentication phase after the configuration phase, generates a transaction message G1 for the specific application function 41 according to the application code information 332 after the authentication phase, and sends the transaction message G1 to the specific external device 79 according to the communication target indicator 37S.
In some embodiments, the information table 49 is an original information table. The local computer 222 obtains the specific identifier 45 from the electronic device 306 through the reader 521, and generates the information table 39 according to the obtained specific identifier 45, the password mask 22A1 and the information table 49. The specific identifier 45 has a binary value having M bits, wherein M>1. The local computer 222 selects N bits from the M bits according to the password mask 22A1 to generate a value K81, wherein N>1.
The local computer 222 encodes the value K81 to generate a control signal K82. The local computer 222 performs an order adjustment operation (such as 22C2) according to the order adjustment table 22C, the information table 49 and the control signal K82 to generate the information table 39; for instance, the information table 39 is equal to the information table 392.
In some embodiments, the local computer 222 performs an authentication operation to authenticate the electronic device 306 in the authentication phase. The authentication operation reads the information table 35 of the electronic device 306 via the reader 521. The authentication operation decrypts the encryption key 352 to determine whether the sub-information 353 represents one of the predetermined value and the specific system constant in order that the local computer 222 authenticates the electronic device 306 for a confirmation that the electronic device 306 is compatible with the system 203 and is an anti-counterfeiting device.
When the local computer 222 determines one of the predetermined value and the specific system constant which the sub-information 353 represents, the local computer 222 confirms that the authentication operation passes. The local computer 222 reads the information table 39 of the electronic device 306 via the reader 521 after the electronic device 306 passes the authentication operation.
In some embodiments, the local computer 222 transforms the information table 39 into an information table 59 according to the specific identifier 45, the password mask 22A1 and the information table 39 by performing a reverse order adjustment operation, wherein the information table 59 includes a plurality of information elements having an information content the same as that of the plurality of information elements 491, 492, . . . 49P, and the plurality of information elements of the information table 59 are arranged according to a third order the same as the first order YP11. The local computer 222 performs the reverse order adjustment operation according to the order adjustment table 22C, the information table 39 and the control signal K82 to generate the information table 59.
The information table 39 is started to be stored in a memory block RB2 in the device memory 336 at a first specific time. The memory block RB2 originally stores an information table 69 at a second specific time before the first specific time. The local computer 222 reads the information table 69 via the reader 521 at a third specific time between the first and the second specific times, and configures the read information table of the information table 69 to form the information table 49.
Please refer to
The electronic tag 301 is coupled to an object 43 and stores a variable state code 3WA and a variable physical parameter code 3UA. The variable state code 3WA represents a variable state WWA which the object 43 is configured to be in. The variable physical parameter code 3UA represents a variable physical parameter UUA associated with the object 43. The system 204 for operating the electronic tag 301 includes a reader 221 and an operation device 28. The operation device 28 is coupled to the reader 221.
Under a condition that the variable physical parameter UUA is substantially equal to a first specific physical parameter UU1, the operation device 28 makes a first logical decision ML1 on whether the variable state code 3WA is currently equal to a first specific state code 3W1 representing a first specific state WW1 via the reader 221. Under a condition that the first logical decision ML1 is true, the operation device 28 changes the variable state code 3WA from the first specific state code 3W1 to a second specific state code 3W2 representing a second specific state WW2 being different from the first specific state WW1 via the reader 221, and assigns a first specific physical parameter code 3U1 representing the first specific physical parameter UU1 to the variable physical parameter code 3UA via the reader 221.
Please additionally refer to
The local computer 222 is configured to make the first logical decision ML1. For instance, under a condition that the first logical decision ML1 is true, the local computer 222 changes the variable state code 3WA from the first specific state code 3W1 to the second specific state code 3W2 via the reader 221, and changes the variable physical parameter code 3UA to the first specific physical parameter code 3U1 via the reader 221. The keyboard 223 is coupled to the local computer 222. For instance, under a condition that the variable physical parameter UUA is substantially equal to the first specific physical parameter UU1, the local computer 222 obtains the first specific physical parameter code 3U1, and changes the variable physical parameter code 3UA to the obtained first specific physical parameter code 3U1 via the reader 221.
The display unit 225 is coupled to the local computer 222. For instance, the local computer 222 controls the reader 221, the keyboard 223 and the display unit 225, and controls the electronic tag 301 via the reader 221. The reader 221 includes a reader antenna 224 and an interface and communication controlling circuit 2211 coupled to the reader antenna 224, and is coupled to the local computer 222. For instance, the reader antenna 224 includes at least one of a UHF antenna and an HF inductive coil.
In some embodiments, the object 43 is one of a user 901 and an application device 902. For instance, the electronic tag 301 is used by the user 901. The application device 902 is a product. Under a condition that the first logical decision ML1 is true, the variable physical parameter code 3UA is changed to the first specific physical parameter code 3U1. For instance, the variable physical parameter UUA is a variable location at which the object 43 is located. For instance, the variable physical parameter UUA is a variable weight of the object 43.
For instance, the variable state WWA is equal to the variable state WWK shown in
The electronic tag 301 includes a tag memory 34, a tag antenna 3J and an interface and communication controlling circuit 3K coupled to the tag antenna 3J and the tag memory 34. For instance, the tag antenna 3J includes at least one of a UHF antenna and an HF inductive coil. The tag memory 34 stores the variable state code 3WA and the variable physical parameter code 3UA.
In some embodiments, the variable physical parameter UUA is substantially equal to the first specific physical parameter UU1 at a first specific time TR1, and is substantially equal to a second specific physical parameter UU2 being different from the first specific physical parameter UU1 at a second specific time TR2 which is later than the first specific time TR1. Under a condition that the variable physical parameter UUA is substantially equal to the first specific physical parameter UU1, the operation device 28 obtains the first specific physical parameter code 3U1.
Under a condition that the first logical decision ML1 is true, the operation device 28 makes a second logical decision ML2 on whether the variable physical parameter code 3UA is currently equal to the obtained first specific physical parameter code 3U1 via the reader 221. Under a condition that the second logical decision ML2 is false, the operation device 28 changes the variable physical parameter code 3UA to the obtained first specific physical parameter code 3U1 via the reader 221.
In some embodiments, under a condition that the variable physical parameter UUA is substantially equal to the second specific physical parameter UU2, the operation device 28 obtains a third specific state code 3W3 representing a third specific state WW3 being different from the second specific state WW2, obtains a second specific physical parameter code 3U2 representing the second specific physical parameter UU2, changes the variable state code 3WA from the second specific state code 3W2 to the obtained third specific state code 3W3 via the reader 221, and makes a third logical decision ML3 on whether the variable physical parameter code 3UA is currently equal to the obtained second specific physical parameter code 3U2 via the reader 221. Under a condition that the third logical decision ML3 is false, the operation device 28 changes the variable physical parameter code 3UA from the first specific physical parameter code 3U1 to the obtained second specific physical parameter code 3U2 via the reader 221. In some embodiments, under a condition that the variable physical parameter UUA is substantially equal to the second specific physical parameter UU2, the operation device 28 makes a specific logical decision on whether the variable state code 3WA is currently equal to a second specific state code 3W2 representing a second specific state WW2 being different from the first specific state WW1 via the reader 221. Under a condition that the specific logical decision is true, the operation device 28 changes the variable state code 3WA from the second specific state code 3W2 to the obtained third specific state code 3W3 via the reader 221, and makes the third logical decision ML3.
The electronic tag 301 further stores a cash card balance 379. Under a condition that the variable physical parameter UUA is substantially equal to the second specific physical parameter UU2 and the variable physical parameter code 3UA is equal to the first specific physical parameter code 3U1, the operation device 28 reads the first specific physical parameter code 3U1 stored in the electronic tag 301 via the reader 221. For instance, under a condition that the third logical decision ML3 is false, the operation device 28 reads the first specific physical parameter code 3U1 stored in the electronic tag 301 via the reader 221. The operation device 28 performs a scientific calculation CQ1 according to at least one of the read first specific physical parameter code 3U1 and the obtained second specific physical parameter code 3U2 to determine an application value VG1, and performs a functional operation NF1 according to the application value VG1 to change the cash card balance 379 via the reader 221. For instance, the functional operation NF1 is performed to further display an application message MF1 associated with the application value VG1. For instance, the local computer 222 performs the functional operation NF1 according to the application value VG1 to cause the display unit 225 to display the application message MF1. For instance, the tag memory 34 further stores a communication target indicator 37S indicating a specific device 79. The communication target indicator 37S is used to link to the specific device 79 by the system 204. Under a condition that the variable physical parameter UUA is substantially equal to the second specific physical parameter UU2, the operation device 28 reads the stored communication target indicator 37S via the reader 221, generates a transaction message G1 according to the application value VG1, and sends the transaction message G1 to the specific device 79 according to the read communication target indicator 37S.
In some embodiments provided according to the illustrations in
Under a condition that the variable physical parameter UUA is substantially equal to a first specific physical parameter UU1, a first logical decision ML1 is made by the system 204 on whether the variable state code 3WA is currently equal to a first specific state code 3W1 representing a first specific state WW1. Under a condition that the first logical decision ML1 is true: the variable state code 3WA is changed by the system 204 from the first specific state code 3W1 to a second specific state code 3W2 representing a second specific state WW2 being different from the first specific state WW1; and a first specific physical parameter code 3U1 representing the first specific physical parameter UU1 is assigned to the variable physical parameter code 3UA by the system 204.
In some embodiments, the variable physical parameter UUA is substantially equal to the first specific physical parameter UU1 at a first specific time TR1, and is substantially equal to a second specific physical parameter UU2 being different from the first specific physical parameter UU1 at a second specific time TR2 which is later than the first specific time TR1. Under a condition that the variable physical parameter UUA is substantially equal to the first specific physical parameter UU1, the system 204 obtains the first specific physical parameter code 3U1.
Under a condition that the first logical decision ML1 is true, the system 204 makes a second logical decision ML2 on whether the variable physical parameter code 3UA is currently equal to the obtained first specific physical parameter code 3U1. Under a condition that the second logical decision ML2 is false, the variable physical parameter code 3UA is changed by the system 204 to the obtained first specific physical parameter code 3U1.
In some embodiments, under a condition that the variable physical parameter UUA is substantially equal to the second specific physical parameter UU2, the system 204 obtains a third specific state code 3W3 representing a third specific state WW3 being different from the second specific state WW2, obtains a second specific physical parameter code 3U2 representing the second specific physical parameter UU2, changes the variable state code 3WA from the second specific state code 3W2 to the obtained third specific state code 3W3, and makes a third logical decision ML3 on whether the variable physical parameter code 3UA is currently equal to the obtained second specific physical parameter code 3U2. Under a condition that the third logical decision ML3 is false, the variable physical parameter code 3UA is changed by the system 204 from the first specific physical parameter code 3U1 to the obtained second specific physical parameter code 3U2. In some embodiments, under a condition that the variable physical parameter UUA is substantially equal to the second specific physical parameter UU2, the system 204 makes a specific logical decision on whether the variable state code 3WA is currently equal to a second specific state code 3W2 representing a second specific state WW2 being different from the first specific state WW1. Under a condition that the specific logical decision is true, the system 204 changes the variable state code 3WA from the second specific state code 3W2 to the obtained third specific state code 3W3, and makes the third logical decision ML3.
The tag memory 34 further stores a cash card balance 379. Under a condition that the variable physical parameter UUA is substantially equal to the second specific physical parameter UU2 and the variable physical parameter code 3UA is equal to the first specific physical parameter code 3U1, the system 204 reads the first specific physical parameter code 3U1 stored in the electronic tag 301. The system 204 performs a scientific calculation CQ1 according to at least one of the read first specific physical parameter code 3U1 and the obtained second specific physical parameter code 3U2 to determine an application value VG1, and performs a functional operation NF1 according to the application value VG1 to change the cash card balance 379. For instance, the functional operation NF1 is performed to further display an application message MF1 associated with the application value VG1. For instance, the tag memory 34 further stores a communication target indicator 37S indicating a specific device 79. The communication target indicator 37S is used to link to the specific device 79 by the system 204. Under a condition that the variable physical parameter UUA is substantially equal to the second specific physical parameter UU2, the system 204 (or the operation device 28) reads the stored communication target indicator 37S, generates a transaction message G1 according to the application value VG1, and sends the transaction message G1 to the specific device 79 according to the read communication target indicator 37S.
In some embodiments proposed according to the illustrations in
The method includes the following steps. Under a condition that the variable physical parameter UUA is substantially equal to a first specific physical parameter UU1, a logical decision is made on whether the variable state code 3WA is currently equal to a first specific state code 3W1 representing a first specific state WW1. In addition, under a condition that the logical decision is true: the variable state code 3WA is changed from the first specific state code 3W1 to a second specific state code 3W2 representing a second specific state WW2 being different from the first specific state WW1, and a first specific physical parameter code 3U1 representing the first specific physical parameter UU1 is assigned to the variable physical parameter code 3UA.
In some embodiments, the object 43 is one of a user 901 and an application device 902. For instance, the electronic tag 301 is used by the user 901. The application device 902 is a product. Under a condition that the first logical decision ML1 is true, the variable physical parameter code 3UA is changed to the first specific physical parameter code 3U1. For instance, the variable physical parameter UUA is a variable location at which the object 43 is located.
For instance, the variable state WWA is equal to the variable state WWK shown in
In some embodiments, the variable physical parameter UUA is substantially equal to the first specific physical parameter UU1 at a first specific time TR1, and is substantially equal to a second specific physical parameter UU2 being different from the first specific physical parameter UU1 at a second specific time TR2 which is later than the first specific time TR1.
The method further includes the following steps. Under a condition that the variable physical parameter UUA is substantially equal to the first specific physical parameter UU1, the first specific physical parameter code 3U1 is obtained. In addition, under a condition that the first logical decision ML1 is true, making a second logical decision ML2 is made on whether the variable physical parameter code 3UA is currently equal to the obtained first specific physical parameter code 3U1.
The step of assigning the first specific physical parameter code 3U1 to the variable physical parameter code 3UA includes a sub-step that: under a condition that the second logical decision ML2 is false, the variable physical parameter code 3UA is changed to the obtained first specific physical parameter code 3U1.
In some embodiments, the method further includes the following steps. Under a condition that the variable physical parameter UUA is substantially equal to the second specific physical parameter UU2: a third specific state code 3W3 representing a third specific state WW3 being different from the second specific state WW2 is obtained; a second specific physical parameter code 3U2 representing the second specific physical parameter UU2 is obtained; the variable state code 3WA is changed from the second specific state code 3W2 to the obtained third specific state code 3W3; and a third logical decision ML3 is made on whether the variable physical parameter code 3UA is currently equal to the obtained second specific physical parameter code 3U2. In addition, under a condition that the third logical decision ML3 is false, the variable physical parameter code 3UA is changed from the first specific physical parameter code 3U1 to the obtained second specific physical parameter code 3U2.
The electronic tag 301 further stores a cash card balance 379. The method further includes the following steps. Under a condition that the variable physical parameter UUA is substantially equal to the second specific physical parameter UU2 and the variable physical parameter code 3UA is equal to the first specific physical parameter code 3U1, the first specific physical parameter code 3U1 stored in the electronic tag 301 is read. A scientific calculation CQ1 is performed according to at least one of the read first specific physical parameter code 3U1 and the obtained second specific physical parameter code 3U2 to determine an application value VG1. In addition, a functional operation NF1 is performed according to the application value VG1 to change the cash card balance 379. For instance, the functional operation NF1 is performed to further display an application message MF1 associated with the application value VG1. For instance, under a condition that the third logical decision ML3 is false, the first specific physical parameter code 3U1 stored in the electronic tag 301 is read.
1. A method of building an item information table in an RFID tag using encrypted keys for a radio frequency identification tag item processing system (RFID TIPS), the RFID tag including a tag identifier and a tag memory, the tag memory being divided into memory sectors and blocks, the tag identifier including a tag serial number and a manufacturer identifier, the RFID TIPS allocating an RFID tag data structure and a set of system constants in its working memory, the set of system constants including length of first information table, length of second information table, first password mask, and hash table, the RFID tag data structure including Reserved Memory (RM) block, Tag Identifier (TID) block, Unique Item Identifier (UII) block, and User Memory (UM) block, the UII block including first memory block and second memory block, the TID block including a tag identifier, the tag identifier including a tag serial number and a manufacturer identifier, an item information table being stored the RFID tag data structure according to a plural authentication steps, the item information table including first information table, second information table, item kill password and item access password, first information table being stored the first memory block, second information table being stored the second memory block, an item kill password and an item access password being stored the RM block, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and item expiration date, the first encrypted key including an encrypted second sub-information, the first other information including item serial number and first PC information, the second information table including a receiving brief message phone number and second other information, the second other information including a start control table, the second sub-information indicating the length of the second information table, the method comprising steps of:
reading the tag identifier of the RFID tag and storing it in the tag identifier of the RFID tag data structure which includes a tag serial number and a manufacturer identifier;
creating the item code, the item serial number, and the user serial number;
setting the item expiration date;
setting the second sub-information and creating the first encrypted key;
setting the first PC information to include the length of first information table;
obtaining the receiving brief message phone number and parameter values of the second other information in the second information table, the parameter values includes signal values of the start control table;
creating the item kill password and the item access password according to the tag serial number, the first password mask, and the hash table; and
storing the first information table, the second information table, the item kill password, and the item access password in the RFID tag.
2. The method of Embodiment 1, wherein creating the item code, the item serial number, and the user serial number according to a set of encoding and serializing method, and the method further comprises steps of:
concatenating the item code and the item serial number to become an organization identifier which includes the name, code number, or business unified serial number of company or organization, or
concatenating the item code and the item serial number to become a community identifier which includes the name, code number, or business unified serial number of community or association, or
creating the item code which includes RFID business sub-code, RFID device sub-code, RFID selecting enable function sub-code, RFID function sub-code, RFID deployment country sub-code, and any combination of above sub-codes, wherein:
the RFID business sub-code includes (1) finance, (2) transportation, (3) logistics, (4) supply chain, (5) item level tracking, (6) access control and asset management, (7) scientific technology, and (8) system reserved fields;
the RFID device sub-code includes device made of an RFID tag, or assembled other device with an RFID tag, including (1) nonconductive adhesive label device, (2) nonconductive plastic packaged device having a thickness with its shape as card, box, round, polygon, or symbolizing an event, people, or region, (3) display unit or mobile device for receiving and display a brief message or image, (4) device assembled an RFID tag with other nonconductive material including wood, leather, non-fabric, or a nonconductive packaging material attaching to an metal layer;
the RFID selecting enable function sub-code includes user selected enable functions for a RFID business sub-code, the user selected enable functions includes when business sub-code is finance, (1) to enable finance, credit, counter service, access control, item level tracking, and pay cash, (2) or to enable finance, credit, counter service, pay cash, sending brief message, access control, and item level tracking, (3) or to enable finance, credit, counter service, pay cash, select monetary base for cash card balance, access control, and item level tracking, (4) or to enable finance, credit, counter service, pay cash, and system reserved functions;
the RFID function sub-code includes integrated RFID functions in applying an RFID tag to a RFID business sub-code, when RFID business sub-code is finance, the integrated RFID functions includes finance, credit, counter service, pay cash, send brief message, select monetary base for cash card balance, passive UHF long read distance, passive UHF short read distance, passive UHF short read distance with high memory capacity, HF short read distance, HF short read distance with high memory capacity, semi-passive UHF long read distance, access control, and item level tracking, when RFID business sub-code is transportation, the integrated RFID functions includes semi-passive UHF far read distance (50 to 100 meters) for locating while moving, semi-passive UHF far read distance with high memory capacity (above 8K words), passive UHF long read distance (above 5 to 10 meters) for locating, passive UHF long read distance with high memory capacity (above 64K words), passive UHF near read distance (below 50 to 100 millimeters), passive UHF near read distance with high memory capacity, passive HF short read distance (below 5 to 10 millimeters) for access control and locating, passive HF short read distance with high memory capacity;
the RFID deployment country sub-code includes the divided countries and regions for a RFID business sub-code according to the deployed country of an RFID tag;
creating the item serial number and the user serial number comprises:
generating code number according to sub-code including organization for a RFID business sub-code of the item code;
generating code number according to sub-codes including area, location, building, and floor for a RFID business sub-code of the item code; and
when not using the item code and the item serial number, generating the user serial number includes setting a serial number starting from 1, or a system code number indicating finance authenticating card system, finance cash authenticating card system, credit cash authenticating card system, finance credit cash authenticating card system, finance access control authenticating card system, finance cash access control authenticating card system, credit cash access control authenticating card system, finance credit cash access control authenticating card system, or
creating the user serial number comprises:
generating a serial number starting from 1 for the item code and the item serial number, or
generating code number according to sub-codes of the user serial number including user group and discount rate.
3. The method of Embodiments 1-2, wherein setting the second sub-information and creating the first encrypted key further comprises steps of:
setting the second sub-information includes setting to be the length of the second information table or its code number, or other system constant; and
creating the first encrypted key including a set of operations on the tag serial number, the user serial number, the second sub-information, and/or a combination of the above, the set of operations comprises:
the first encrypted key being the sum of the tag serial number, the user serial number, and the second sub-information, or
the first encrypted key being the sum of the tag serial number, and the second sub-information, or
the set of operations including sum, subtract, multiply, logic, and/or a combination of the above, or
the first encrypted key resulting from prior operations being 3 words long, of which only its rightmost 2 or 1 word can be extracted as the final first encrypted key.
4. The method of Embodiments 1-3, wherein obtaining the values of parameters in the second information table further includes obtaining values of parameters in the second other information, the parameters includes a start control table which includes access control signal values used for a community or SME, and is stored in different memory sector or block of the RFID tag data structure, the method further comprises steps of:
making each and every bit of the start control table corresponding to a start signal to an access control area, when the corresponding bit value being a 1, indicating passing through the access control area is allowed, and proceeding to start, display, and record the electric devices for passing through the access control area which includes sending a brief message to the receiving brief message phone number, when the corresponding bit value being a 0, indicating passing through the access control area is not allowed, and proceeding to start, display, and record the electric devices for not passing through the access control area which includes sending a brief message to the receiving brief message phone number, the start control table being allocated to the UII block is used for centralized managing the passing through and start of electric devices of plural access control areas;
the start control table being allocated to other memory block of the RFID tag including the UM block is also used for centralized managing the passing through and start of electric devices of plural access control areas; and
setting unused bits in the start control table to a default value 0.
5. The method of Embodiments 1-4, wherein creating the item kill password and the item access password further includes a method of obtaining a set of hash values, the method comprises steps of:
generating a specific bit from the tag serial number and the first password mask as a controlling signal to the hash table, when the value of specific bit being an odd number, obtaining a first kill password value and a first access password value, and setting the first kill password to the first kill password value and the first access password to the first access password value, when the value of specific bit being an even number, obtaining a second kill password value and a second access password value, and setting the second kill password to the second kill password value and the second access password to the second access password value; or
generating P specific bits from the tag serial number and the first password mask as controlling signals to a hash table;
obtaining a set of item kill password value and item access password value from the hash table by the P specific bits, the hash table including at most 2P set of item kill password value and item access password value; and
setting the set of item kill password value and item access password value to the item kill password and the item access password respectively.
6. A method of authenticating an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiment 1-5, the RFID TIPS including a set of system constants which including length of first information table, length of second information table, and hash table, the RFID tag including a tag identifier and an item information table which being built in accordance with a plural authentication steps, the item information table including first information table and second information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and item expiration date, the first other information including item serial number and first PC information, the second information table including a receiving brief message phone number and second other information, the method comprising steps of:
selecting and inventorying the RFID tag based on the item code and the item serial number;
reading the first information table including first encrypted key and item expiration date;
verifying the length of the first information table and the item expiration date;
reading the tag identifier which includes a tag serial number and a manufacturer identifier;
decrypting the first encrypted key to obtain the second sub-information;
verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system;
reading the second information table based on the second sub-information;
using the second other information and the receiving brief message phone number; and
ending the communication dialog with the RFID tag.
7. The method of Embodiments 1-6, wherein decrypting the first encrypted key further comprises steps of:
performing a set of operations being the reverse to the encrypting operations on the first encrypted key, the tag serial number, the user serial number to obtain the second sub-information, the set of operations comprises:
obtaining the second sub-information by subtracting the tag serial number and the user serial number from the first encrypted key, or
obtaining the second sub-information by subtracting the tag serial number from the first encrypted key, or
obtaining the second sub-information by performing a set of operations being the reverse to the encrypting operations including add, sum, subtract, multiply, logic, and/or a combination of the above.
8. A method according to Embodiments 1-7, the RFID TIPS allocating an RFID tag data structure and a set of system constants in its working memory, the set of system constants including length of first information table, length of second information table, first password mask, second password mask, hash table, and adjust ordering table, and the second information table being stored in the RFID tag data structure including receiving brief message phone number and second other information, the second other information including a RFID access control table, the second sub-information indicating the length of the second information table, the method of building the item information table comprising steps of:
reading the tag identifier of the RFID tag and storing it in the tag identifier of the RFID tag data structure which includes a tag serial number and a manufacturer identifier;
creating the item code, the item serial number, and the user serial number;
setting the item expiration date;
setting the second sub-information and creating the first encrypted key;
setting the first PC information to include the length of first information table;
obtaining parameter values of the second information table which including the receiving brief message phone number, and parameter values of the second other information which including signal values of the RFID access control table;
creating the item kill password and the item access password according to the tag serial number, the first password mask, and the hash table;
creating a second information table with parameter values stored in different ordering according to the tag serial number, the second password mask, and the original second information table; and
storing the first information table, the second information table, the item kill password, and the item access password in the RFID tag.
9. The method of Embodiments 1-8, wherein creating a second information table with parameter values stored in different ordering further includes a method of obtaining a set of adjust ordering operation, the method comprises steps of:
generating a N specific bits from the tag serial number and the second password mask as controlling signals to the adjust ordering table;
obtaining a set of adjust ordering operation from the adjust ordering table according to the N specific bits, the adjust ordering table including at most 2N sets of adjust ordering operation; and
performing the set of adjust ordering operation on the parameters of the second information table to obtain a new second information table with parameter values stored in different ordering.
10. The method of Embodiments 1-9, wherein obtaining the parameter values of the second information table further includes obtaining parameter values of second other information, the second other information includes a RFID access control table which includes access control signal values used for organizations of cross countries, regions, and cities, stored in different memory sector or block of the RFID tag data structure, the method further comprises steps of:
making each and every bit of the RFID access control table corresponding to a start signal to an access control area, when the corresponding bit value being a 1, indicating passing through the access control area is allowed, and proceeding to start, display, and record the electric devices for passing through the access control area which includes sending a brief message to the receiving brief message phone number, when the corresponding bit value being a 0, indicating passing through the access control area is not allowed, and proceeding to start, display, and record the electric devices for not passing through the access control area which includes sending a brief message to the receiving brief message phone number, the RFID access control table being allocated to the UII block is used for centralized managing the passing through and start of electric devices of plural access control areas;
the RFID access control table being allocated to other memory block of the RFID tag including the UM block is also used for centralized managing the passing through and start of electric devices of plural access control areas; and
setting unused bits in the RFID access control table to a default value 0.
11. A method of authenticating an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-10, the RFID TIPS including a set of system constants which including length of first information table, length of second information table, hash table, and adjust ordering table, the RFID tag including a tag identifier and an item information table which being built in accordance with a plural authentication steps, the item information table including first information table and second information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and item expiration date, the first other information including item serial number and first PC information, the second information table including a receiving brief message phone number and second other information, the method comprising steps of:
selecting and inventorying the RFID tag based on the item code and the item serial number;
reading the first information table including first encrypted key and item expiration date;
verifying the length of the first information table and the item expiration date;
reading the tag identifier which includes a tag serial number and a manufacturer identifier;
decrypting the first encrypted key to obtain the second sub-information;
verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system;
reading the second information table based on the second sub-information;
obtaining the original second information table by performing a set of unadjust ordering operation;
using the second other information and the receiving brief message phone number; and
ending the communication dialog with the RFID tag.
12. The method of Embodiments 1-11, wherein obtaining the original second information table by performing a set of unadjust ordering operation further comprises a method of obtaining a set of adjust ordering operation, the method comprises steps of:
generating a N specific bits from the tag serial number and the second password mask as controlling signals to the adjust ordering table;
obtaining a set of adjust ordering operation from the adjust ordering table according to the N specific bits, the adjust ordering table includes at most 2N sets of adjust ordering operation; and
performing the set of unadjust ordering operation being the reverse of adjust ordering operation on the parameters of the second information table to obtain a second information table with parameter values stored in its original order.
13. A method according to Embodiments 1-12, the RFID TIPS allocating an RFID tag data structure and a set of system constants in its working memory, the set of system constants including length of first information table, length of second information table, first password mask, second password mask, CompType, AuthenticationType, hash table, and adjust ordering table, and the second information table being stored in the RFID tag data structure including second authentication information, receiving brief message phone number and second other information, the second authentication information including an user password, the second other information including a RFID access control table, the second sub-information indicating the length of the second information table, the method of building the item information table comprising steps of:
reading the tag identifier of the RFID tag and storing it in the tag identifier of the RFID tag data structure which including a tag serial number and a manufacturer identifier;
creating the item code, the item serial number, and the user serial number;
setting the item expiration date;
setting the second sub-information and creating the first encrypted key;
setting the first PC information to include the length of first information table;
obtaining parameter values of the second information table which including the receiving brief message phone number, the user password, and signal values of the RFID access control table;
creating the item kill password and the item access password according to the tag serial number, the first password mask, and the hash table;
creating a new second information table with parameter values stored in different ordering according to the tag serial number, the second password mask, and the original second information table; and
storing the first information table, the new second information table, the item kill password, and the item access password in the RFID tag.
14. A method of authenticating an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-13, the RFID TIPS including a set of system constants which including length of first information table, length of second information table, CompType, AuthenticationType, hash table, and adjust ordering table, the RFID tag including a tag identifier and an item information table which being built in accordance with a plural authentication steps, the item information table including first information table and second information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and item expiration date, the first other information including item serial number and first PC information, the second information table including second authentication information, receiving brief message phone number and second other information, the second authentication information including an user password, the method comprising steps of:
selecting and inventorying the RFID tag based on the item code and the item serial number;
reading the first information table including first encrypted key and item expiration date;
verifying the length of the first information table and the item expiration date;
reading the tag identifier which includes a tag serial number and a manufacturer identifier;
decrypting the first encrypted key to obtain the second sub-information;
verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system;
reading the second information table based on the second sub-information;
obtaining the original second information table by performing a set of unadjust ordering operation;
authenticating the second authentication information for using the second other information and the receiving brief message phone number; and
ending the communication dialog with the RFID tag.
15. The method of Embodiments 1-14, wherein authenticating the second authentication information comprises steps of:
requesting user to enter an authenticating password through a numerical key pad;
selecting an authenticating information from the second authentication information according to CompType and AuthenticationType; and
comparing the authenticating password to the authenticating information.
16. A method according to Embodiments 1-15, the RFID TIPS allocating an RFID tag data structure and a set of system constants in its working memory, the set of system constants including length of first information table, length of second information table, length of third information table, first password mask, second password mask, CompType, AuthenticationType, hash table, and adjust ordering table, and an item information table being stored in the RFID tag data structure, the item information table including first information table, second information table, third information table, item kill password and item access password, the first information table being stored in the first memory block, the second information table being stored in the second memory block, the third information table being stored in the UM block, an item kill password and an item access password being stored in the RM block, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and item expiration date, the first encrypted key including an encrypted second sub-information, the first other information including item serial number and first PC information, the second information table including second authenticating information, second encrypted key, and second other information, the second encrypted key including an encrypted third sub-information, the second sub-information indicating the length of the second information table, the third sub-information indicating the length of the third information table, the method of building the item information table comprising steps of:
reading the tag identifier of the RFID tag and storing it in the tag identifier of the RFID tag data structure which including a tag serial number and a manufacturer identifier;
creating the item code, the item serial number, and the user serial number;
setting the second sub-information and creating the first encrypted key;
setting the first PC information to include the length of first information table;
obtaining parameter values of the second information table including the default values of plural passwords;
setting the third sub-information and creating the second encrypted key;
creating the item kill password and the item access password according to the tag serial number, the first password mask, and the hash table;
creating a new second information table with parameter values stored in different ordering according to the tag serial number, the second password mask, and the original second information table;
obtaining parameter values of the third information table; and
storing the first information table, the new second information table, the item kill password, and the item access password in the RFID tag.
17. The method of Embodiments 1-16, wherein setting the third sub-information and creating the second encrypted key further comprises steps of:
setting the third sub-information includes setting to be the length of the third information table or its code number, or other system constant; and
creating the second encrypted key including a set of arithmetic and logic operations on the tag serial number, the user serial number, and/or a combination of the above, the set of operations includes:
the second encrypted key being the sum of the tag serial number, and the third sub-information, or
the second encrypted key being equal to the third sub-information, or
the second encrypted key resulting from prior operations being 3 words long, of which only its rightmost 2 or 1 word can be extracted as the final second encrypted key.
18. The method of Embodiments 1-17, wherein the second information table further comprises:
a second authentication information and a second other information, the second authentication information comprises savings account password, counter service password, credit account password, compare failed count, cash card balance, and any arbitrary ordering of parameters, the second other information includes savings account number, credit account number, cash card information, and any arbitrary ordering of parameters;
the cash card information comprises cash card store category, cash card merchant serial number, cash card balance monetary base, variable status code associated with cash card use, and cash card getting on station number;
creating the cash card store category comprises creating store business sub-code, store organization sub-code, store branch sub-code, and any arbitrary combination of sub-codes, wherein the store business sub-code comprises transportation service, food and drink, retails, department stores, household appliance, entertainment, distribution channel, and other reserved store category, the store organization sub-code for store business sub-code being retails includes 7-11 chain convenient stores, all family chain stores, all family chain stores, Evergreen Fresh Produce company, South North Multigrain company, Prosper Drink company, Everyday Automatic Vending company, and other reserved store organization, the store organization sub-code for store business sub-code being transportation service comprises Taipei transportation company, Capital transportation company, Doo Doo Doo Parking Lot Company, Keelung transportation company, and other reserved store organization, the store branch sub-code comprises creating store branches for the store organization sub-code in the store business sub-code, wherein for the Doo Doo Doo Parking Lot Company in transportation service comprises Taipei Shilin branch, Taoyuan Chungli branch, Taichung Qingshui branch, Tainan Yungkang branch, Taoyuan International Airport branch, and other reserved store branch; and
creating cash card merchant serial number comprises generating store merchant serial number for a store categorized by the cash card store category, which comprises generating store merchant serial number from 1 to a maximum number 65,635, or from 1D to 9999D for a retail store in retails business, or generating public transport route number from 1D to 9999D for a transport company in transportation service business, or generating on-line game number from 1D to 9999D for an on-line game company in entertainment business.
19. The method of Embodiments 1-18, wherein the second information table further comprises:
a second authentication information and a second other information, the second authentication information comprises savings account password, counter service password, credit account password, compare failed count, cash card balance, and any arbitrary ordering of parameters, the second other information comprises savings account number, credit account number, cash card information, and any arbitrary ordering of parameters;
the cash card information comprises cash card store category, cash card merchant serial number, cash card balance monetary base, variable status code associated with cash card use, and cash card getting on station number, or
the cash card information comprises cash card store category, cash card merchant serial number, cash card balance monetary base, variable status code associated with cash card use, cash card merchant unit price, cash card merchant weight, and cash card merchant purchasing amount; and
the cash card balance monetary base comprises select monetary exchange function inspection sub-code, assign cash card balance width and precision format sub-code, monetary base sub-code, wherein the select monetary exchange function inspection sub-code indicates the use status of the cash card balance monetary base which comprises the select monetary exchange function not enabled, the select monetary exchange function not selected, the select monetary exchange function selected, the assign cash card balance width and precision format selected, the select monetary exchange function enabled, and other system reserved use, the assign cash card balance width and precision format sub-code indicates the cash card balance as a 32 bit floating variable which comprises assign width to 7 digits and decimal point to 0 digit, assign width to 7 digits and decimal point to 1 digit, assign width to 7 digits and decimal point to 2 digits, and other system reserved use, the monetary base sub-code indicates the monetary base selected for the cash card balance which comprises US dollar, British pound, RMB, Euro dollar, Hong Kong dollar, Japanese yen, New Taiwan dollar, VND, and other system reserved use.
20. The method of Embodiments 1-19, an item information table is stored in an RFID tag for a Finance Credit cash Authentication Card, the RFID tag includes Reserved Memory (RM) block, Tag Identifier (TID) block, Unique Item Identifier (UII) block, and User Memory (UM) block, the UII block includes first memory block and second memory block, the TID block includes a tag identifier, the tag identifier includes a tag serial number and a manufacturer identifier, the item information table includes first information table, second information table, third information table, item kill password and item access password, an item kill password and an item access password are stored in the RM block, the first information table being stored in the first memory block, the second information table is stored in the second memory block, the third information table is stored in the third memory block, first information table and second information table are stored in the UII block, the first information table includes item code, item serial number, user serial number, first encrypted key, first PC information, the first encrypted key includes an encrypted second sub-information, the second information table includes savings account password, counter service password, credit account password, compare failed count, cash card balance, second encrypted key, savings account number, credit account number, cash card store category, cash card merchant serial number, cash card balance monetary base, variable status code associated with cash card use, cash card getting on station number, and any arbitrary ordering of parameters, the UM block stores third information table which includes transfer account number 1, transfer account number 2, transfer account number 3, transfer account number 4, transfer account number 5, transfer account number 6, the second encrypted key includes an encrypted third sub-information, the second sub-information indicating the length of the second information table, the third sub-information indicating the length of the third information table, variations of the item information table further comprises:
the word length of some parameters in first information table, second information table, and third information table vary between 3 words and 1 word for different applications, wherein variations comprises:
extracting the rightmost 1 or 2 words of the 3 word first encrypted key to get a 1 or 2 word first encrypted key;
substituting the 3 word second encrypted key with a receiving brief message phone number;
extracting the rightmost 1 or 2 words of the 3 word second encrypted key to get a 1 or 2 word second encrypted key;
increasing the item code from 1 word to 2 words; and
increasing the item serial number from 1 word to 2 words; and
the third information table includes a transfer account table, it also includes a RFID access control table, a receiving brief message phone number table, or a combination of the above, wherein variations comprises:
substituting portion of the transfer account table with access control area code numbers;
substituting portion of the transfer account table with receiving brief message phone number table which comprises 4 word receiving brief message phone numbers; and
substituting portion of the transfer account table with access control area code numbers and receiving brief message phone number table.
21. A method of authenticating an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-20, the RFID TIPS including a set of system constants which including length of first information table, length of second information table, length of third information table, CompType, AuthenticationType, hash table, and adjust ordering table, the RFID tag including a tag identifier and an item information table which being built in accordance with a plural authentication steps, the item information table including first information table and second information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, and user serial number, the first other information including item serial number and first PC information, the second information table including second authentication information, second encrypted key and second other information, the method comprising steps of:
selecting and inventorying the RFID tag based on the item code;
reading the first information table;
reading the tag identifier which includes a tag serial number and a manufacturer identifier;
decrypting the first encrypted key to obtain the second sub-information;
verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system;
reading the second information table based on the second sub-information;
obtaining the original second information table by performing a set of unadjust ordering operation;
authenticating the second authentication information for using the second other information; and
ending the communication dialog with the RFID tag.
22. The method of Embodiments 1-21, wherein decrypting the second encrypted key comprises steps of:
performing a set of operations being the reverse to the encrypting operations on the second encrypted key, the tag serial number, and their arbitrary combination to obtain the third sub-information, the set of operations includes:
obtaining the third sub-information by subtracting the tag serial number from the second encrypted key, or
equating the third sub-information to the second encrypted key;
when the second encrypted key is not used, it is substituted with a receiving brief message phone number, and the third sub-information indicating length of the third information table.
23. The method of Embodiments 1-22, wherein third information table is stored in the UM block, the item information table further includes a third information table which includes a transfer account table, or a receiving brief message phone number table, or a combination of the above, the method further comprises steps of:
reading the second information table and obtaining the second encrypted key by performing a set of unadjust ordering operation;
decrypting the second encrypted key to obtain the third sub-information;
reading and using the third information table based on the third sub-information; and
ending the communication dialog with the RFID tag.
24. The method of Embodiments 1-23, wherein the set of system constants further includes a travel route station number table, a travel route information table, a ticket rate and fare table, and a merchant sales table, the method of authenticating the second authentication information further includes a method of authenticating user password, a method of authenticating cash card balance, a method of using cash card information for measurable merchant, a method of using cash card information for non-measurable merchant, a method of using cash card information for public long distance transportation system, and a method of using cash card balance monetary base, wherein:
the method of authenticating user password comprises steps of:
requesting user to enter an authenticating password through an input device which includes a numerical key pad;
selecting an authenticating information from the second authentication information which includes a credit account password, a savings account password, and a counter service password according to CompType and AuthenticationType; and
comparing the authentication password to the authentication information; and
permitting to use the authentication information after passing the comparing the authentication password to the authentication information;
the method of authenticating cash card balance comprises processing flow states of:
when using the cash card balance for paying the expense amount, the processing flow includes states comprises verifying first if the cash card balance ≥the expense amount, paying cash again, insufficient cash card balance, cash advance a fixed amount from user's credit account number;
the method of using cash card information for measurable merchant comprises processing flow states of:
proceeding to a pay expense amount preprocessing according to cash card store category and cash card merchant serial number, the processing flow states comprises authenticating the authentication cash card for anti-counterfeiting and belonging to the same system, writing a measurable merchant information of a start measuring time, distance, weight, or flow amount into the authentication cash card;
when presenting the authentication cash card for paying cash, the processing flow states comprises again authenticating the authentication cash card for anti-counterfeiting and belonging to the same system in accordance with a plural authentication steps, displaying the measured merchant information of time, distance, weight, or flow amount, obtaining unit price of time, distance, weight, or flow amount for the measured merchant from the merchant sales table, converting the merchant consuming information of measured merchant into cash expense amount;
subtracting the cash expense amount from the cash card balance of the authentication cash card, displaying and recording the transaction, and/or sending a summary to the receiving brief message phone number;
the method of using cash card information for non-measurable merchant comprises processing flow states of:
proceeding to a pay expense amount preprocessing according to cash card store category and cash card merchant serial number, reading merchant consuming information of a non-measured merchant comprising merchant barcode, its code number, or its name;
when presenting the authentication cash card for paying cash, the processing flow states comprises authenticating the authentication cash card for anti-counterfeiting and belonging to the same system in accordance with a plural authentication steps, displaying unit price of the non-measurable merchant from the merchant sales table, obtaining quantity of the non-measurable merchant, converting the merchant consuming information of non-measurable merchant into cash expense amount;
subtracting the cash expense amount from the cash card balance of the authentication cash card, displaying and recording the transaction, and/or sending a summary to the receiving brief message phone number;
the method of using cash card information for public long distance transportation system comprises processing flow states of:
when taking public long distance transportation system, using cash card store category, cash card merchant serial number, user serial number(Rate), cash card getting on station number(Last Station ID, LastSID), variable status code (Status Code) associated with cash card use, and cash card balance(Balance) for tracking the use of the authentication cash card, the processing flow states comprises authenticating the authentication cash card for anti-counterfeiting and belonging to the same system in accordance with a plural authentication steps, checking Status Code and proceeding to a getting on procedure, a getting off procedure, and an authentication cash card use exception procedure, wherein the getting on procedure and the getting off procedure comprises flow states of waiting for use, has gotten on, Fare has been paid, preparing to get off, obtaining Fare based on Rate and LastSID, inspect Balance ≥Fare, insufficient Balance when getting off, and entering a credit card account for cash advance, the authentication cash card use exception procedure includes flow states of displaying status information associated with Status Code and insufficient Balance, incomplete getting off procedure, incomplete getting on procedure, or entering an authenticating user status mode, and authenticating user status by checking the entered user number and authentication password, after passing the authenticating user number and authentication password successfully, then selecting to execute a system function which includes entering date and driver serial number, setting travel route number, loading travel route information table, loading ticket rate and fare table, inquiring travel route and its ticket rate and fare, reading total collected amount, reading each collected amount, reading each cash advance record, resetting Status Code and LastSID of an authentication cash card to a constant including 0 to restore its use, canceling a collected amount, clearing a collected amount record, inquiring travel route timetable, inquiring travel route station number record, and self-test of RFID TIPS;
obtaining an en route station number, or its code number, or its GPS coordinates via second radio channel of a radio network connecting device which comprises the radio channel connected to a mobile radio network through a Wi-Fi access point, or reading an en route station number, or its code number included in a semi-passive long distance RFID tag from another RFID reader;
connecting to a radio network via second radio channel of a radio network connecting device, the method of using the second radio channel comprises:
upon detecting a station name or number ahead matching the next station name or its number, or route mark or its number in the travel route information table, then display or announce the approaching station name or route mark, and sending a brief message or email to a RFID authentication system and RFID information system;
upon detecting current station number or route mark dropping out, or no passenger getting off, then display or announce the expected next station name;
connecting to a radio network via a radio network connecting device, sending a geographic location information and an onsite working information wirelessly to a RFID authentication system and RFID information system for backend processing, wherein the geographic location information comprises time, travel route, vehicle serial number, driver serial number, authenticating exception state of a authentication cash card and its tag serial number, GPS coordinates, the onsite working information comprises a brief message, a shot image, or both a brief message and a shot image;
the method of using cash card balance monetary base comprises processing flow states of:
when using the cash card balance monetary base for paying expense amount, the sub-codes of the cash card balance monetary base comprises select monetary exchange function inspection sub-code, assign cash card balance width and precision format sub-code, monetary base sub-code are used for tracking processing flow states which comprises checking the select monetary exchange function inspection sub-code to ensure the select monetary exchange function has been enabled, again checking the monetary base of the consuming amount and setting in the monetary base sub-code of the cash card balance monetary base are the same, authenticating cash card balance ≥consuming amount, paying cash again, insufficient cash card balance, cash advance a fixed amount from user credit account number, converting consuming amount to have the same monetary base as set for the cash card balance monetary base; and
the method of authenticating the second authentication information further comprises steps of:
authenticating the second authentication information which includes comparing second authentication information to second authentication password;
when passing the authenticating the second authentication information, permits to read and use second other information;
when failing the authenticating the second authentication information, checks if the failed compare count ≥a preset maximal value, when it is false, then increases the failed compare count by 1, when it is true, then starts a kill tag procedure and ends the communication dialog with the RFID tag.
25. A method of building an item information table in an RFID tag using encrypted keys for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-24, the RFID tag including a tag identifier and a tag memory, the tag memory being divided into memory sectors and blocks, the tag identifier including a tag serial number and a manufacturer identifier, the RFID TIPS allocating an RFID tag data structure and a set of system constants in its working memory, the set of system constants including first password mask, length of first information table, length of second information table, length of third information table, and hash table, the RFID tag data structure including tag identifier, first memory block, second memory block, third memory block, and reserved memory (RM) block, and an item information table being stored in the RFID tag data structure, the item information table including first information table, second information table, third information table, item kill password and item access password, the first information table being stored in the first memory block, the second information table being stored in the second memory block, the third information table being stored in the third memory block, an item kill password and an item access password being stored in the RM block, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code and user serial number, the first encrypted key including an encrypted second sub-information, the first other information including item serial number, first PC information, the second information table including second authenticating information and second other information, the first PC information indicating the length of the first information table, the second sub-information indicating the length of the second information table, the third sub-information indicating the length of the third information table, the method of building the item information table comprising steps of:
reading the tag identifier of the RFID tag and storing it in the tag identifier of the RFID tag data structure which includes a tag serial number and a manufacturer identifier;
creating the item code, the item serial number, and the user serial number;
setting the second sub-information and creating the first encrypted key;
creating the item kill password and the item access password;
obtaining parameter values of the second information table and the third information table;
storing the item kill password and the item access password in the RM block;
storing the first information table, the second information table, the item kill password, and the item access password, and the third information table in the RFID tag.
26. A method of authenticating an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-25, the RFID TIPS including a set of system constants which including first password mask, length of first information table, length of second information table, length of third information table, and hash table, the RFID tag including a tag identifier and an item information table which being built in accordance with a plural authentication steps, the item information table including first information table and second information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code and user serial number, the second information table including a second other information, the method comprising steps of:
selecting and inventorying the RFID tag;
reading the first information table;
verifying the length of the first information table;
reading the tag identifier which includes a tag serial number and a manufacturer identifier;
decrypting the first encrypted key to obtain second sub-information;
verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system;
reading the second information table based on the second sub-information; and
using the second other information.
27. The method of Embodiments 1-26, wherein the second information table further includes second authentication information, the second authentication information includes savings account password, counter service password, credit account password, cash card balance, and any arbitrary ordering of parameters, the second other information further includes savings account number, credit account number, cash card information, and any arbitrary ordering of parameters, the item information table further includes a third information table which includes a transfer account number table, a RFID access control table, a receiving brief message phone number table, or a combination of the above, a third sub-information indicating length of the third information table, the method of building the item information table further comprises steps of:
selecting and inventorying the RFID tag based on the item code;
reading the first information table;
decrypting the first encrypted key to obtain the second sub-information;
reading the second information table based on the second sub-information;
authenticating the second authentication information for using the second other information;
reading and using the third information table based on the third sub-information; and
ending the communication dialog with the RFID tag.
28. A method of accessing the ordering adjusted information in an RFID tag for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-27, the RFID TIPS including a password mask and an adjust ordering table, the RFID tag including a tag identifier and a memory, the tag identifier including a tag serial number and a manufacturer identifier, the memory being divided into memory sectors and blocks, an information table being stored in a memory block, an address pointer being used to access a data set of M words in the information table, the adjust ordering table including N adjust ordering control bits, the adjust ordering table including at most 2N sets of arithmetic, logic, and/or displacement operation for adjusting the address pointer, which including making the data set in the information table rotate left, rotate right, swap, or move to different memory sector or block, the method of accessing the ordering adjusted information including method of storing the ordering adjusted information and method of reading the ordering adjusted information, wherein:
the method of storing the ordering adjusted information (abbr. adjusted WRITE/adjusted block WRITE) comprising steps of:
reading the tag identifier which including a tag serial number;
extracting a N specific bits from the tag serial number as N adjust ordering control bits of the adjust ordering table based on AND logic operation of the tag serial number and the password mask;
selecting a set of adjust ordering operation from the adjust ordering table for adjusting the address pointer based on the N adjust ordering control bits; and
writing a data set of M words into a memory block pointed by the adjusted address pointer; and
the method of reading the ordering adjusted information (abbr. adjusted READ/adjusted block READ) comprising steps of:
reading the tag identifier which includes a tag serial number;
extracting a N specific bits from the tag serial number as N adjust ordering control bits of the adjust ordering table based on AND logic operation of the tag serial number and the password mask;
selecting a set of adjust ordering operation from the adjust ordering table for adjusting the address pointer based on the N adjust ordering control bits;
reading a data set of M words from a memory location pointed by the adjusted address pointer.
29. A method of building an item information table in an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-28, the RFID tag including a tag identifier and a tag memory, the tag memory being divided into memory sectors and blocks, the tag identifier including a tag serial number and a manufacturer identifier, the RFID TIPS allocating an RFID tag data structure and a set of system constants in its working memory, the set of system constants including a system code number and a system number, the system code number indicating item information table system built in an RFID tag, the RFID tag data structure including an encrypted key memory block where a first information table being stored, the RFID tag data structure including an item information table which including first information table, the first information table including first encrypted key and user serial number, the user serial number indicating the system code number, the second sub-information indicating the system number, the method comprising steps of:
reading the tag identifier of the RFID tag and storing it in the tag identifier of the RFID tag data structure;
creating the item code, the item serial number, and the user serial number;
setting the second sub-information and creating the first encrypted key; and
storing the first information table in the RFID tag.
30. A method of authenticating an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-29, the RFID TIPS including a set of system constants which including a system code number and a system number, the RFID tag including a tag identifier and an item information table which being built in accordance with a plural authentication steps, the item information table including first information table which including first encrypted key and user serial number, the user serial number indicating the system code number, the system code number indicating the item information table system built in an RFID tag, the method comprising steps of:
selecting and inventorying the RFID tag;
reading the tag identifier which includes a tag serial number and a manufacturer identifier;
reading the first information table;
decrypting the first encrypted key to obtain the second sub-information; and
verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system.
31. A method of building an item information table in an RFID tag using encrypted keys for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-30, the RFID tag including a tag identifier and a tag memory, the tag memory being divided into memory sectors and blocks, the tag identifier including a tag serial number and a manufacturer identifier, the RFID TIPS allocating an RFID tag data structure and a set of system constants in its working memory, the set of system constants including length of first information table, length of second information table, the RFID tag data structure including tag identifier (TID) block, first memory block and second memory block, and an item information table being stored in the RFID tag data structure, the item information table including tag identifier, first information table and second information table, the tag identifier storing a tag serial number and a manufacturer identifier, the first memory block storing first information table, the second memory block storing second information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and item expiration date, the first encrypted key including an encrypted second sub-information, the first other information including item serial number, the second information table includes a receiving brief message phone number and second other information, the second other information including a RFID access control table, the second sub-information indicating the length of the second information table, the method comprising steps of:
reading the tag identifier of the RFID tag and storing it in the tag identifier of the RFID tag data structure which includes a tag serial number and a manufacturer identifier;
creating the item code, the item serial number, and the user serial number;
setting the item expiration date;
obtaining the receiving brief message phone number and parameter values of the second other information in the second information table, the parameter values include signal values of the RFID access control table;
setting the second sub-information and creating the first encrypted key; and
storing the first information table and the second information table in the RFID tag.
32. A method of authenticating an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-31, the RFID TIPS including a set of system constants which including length of first information table and length of second information table, the RFID tag including a tag identifier and an item information table which being built in accordance with a plural authentication steps, the item information table including first information table and second information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and item expiration date, the second information table including a receiving brief message phone number and second other information, the method comprising steps of:
selecting and inventorying the RFID tag;
reading the first information table;
verifying the length of the first information table and the item expiration date;
reading the tag identifier which includes a tag serial number and a manufacturer identifier;
decrypting the first encrypted key to obtain the second sub-information;
verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system;
reading the second information table based on the second sub-information;
using the second other information and the receiving brief message phone number; and
ending the communication dialog with the RFID tag.
33. A method according to Embodiments 1-32, the RFID TIPS allocating an RFID tag data structure and a set of system constants in its working memory, the second information table including second authenticating information, receiving brief message phone number, and second other information, the second authenticating information including a user password, the second other information including a start control table, the second sub-information indicating the length of the second information table, the method of building the item information table comprising steps of:
reading the tag identifier of the RFID tag and storing it in the tag identifier of the RFID tag data structure which includes a tag serial number and a manufacturer identifier;
creating the item code, the item serial number, and the user serial number;
setting the item expiration date;
obtaining parameter values of the second information table which includes the receiving brief message phone number, and parameter values include the user password and signal values of the start control table;
setting the second sub-information and creating the first encrypted key;
storing the first information table and the second information table in the RFID tag.
34. A method of authenticating an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-33, the RFID TIPS including a set of system constants which including length of first information table and length of second information table, the RFID tag including a tag identifier and an item information table which being built in accordance with a plural authentication steps, the item information table including first information table and second information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and item expiration date, the second information table including receiving brief message phone number and second other information, the method comprising steps of:
selecting and inventorying the RFID tag;
reading the first information table;
verifying the length of the first information table and the item expiration date;
reading the tag identifier which includes a tag serial number and a manufacturer identifier;
decrypting the first encrypted key to obtain the second sub-information;
verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system;
reading the second information table based on the second sub-information;
authenticating the second authentication information for using the second other information and the receiving brief message phone number; and
ending the communication dialog with the RFID tag.
35. A method of building an item information table in an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-34, the RFID tag including a tag identifier and a tag memory, the tag memory being divided into memory sectors and blocks, the tag identifier including a tag serial number and a manufacturer identifier, the RFID TIPS allocating an RFID tag data structure and a set of system constants in its working memory, the set of system constants including first password mask, length of first information table, length of second information table, length of third information table, CompType, AuthenticationType, and adjust ordering table, the RFID tag data structure including tag identifier, first memory block, second memory block, and third memory block, and an item information table being stored in the RFID tag data structure, the item information table including first information table, second information table, third information table, the first memory block storing the first information table, the second memory block storing the second information table, the third memory block storing the third information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and expiration date, the first encrypted key including an encrypted second sub-information, the first other information including item serial number, the second information table including second authenticating information, receiving brief message phone number and second other information, the second authentication information including savings account password, counter service password, credit account password, compare failed count, cash card balance, and any arbitrary ordering of parameters, the second other information including savings account number, credit account number, cash card information, and any arbitrary ordering of parameters, the cash card information including cash card store category, cash card merchant serial number, cash card balance monetary base, variable status code associated with cash card use, and cash card getting on station number, the third information table including a transfer account table, a RFID access control table, a receiving brief message phone number table, or a combination of the above, the second sub-information indicating the length of the second information table, the third sub-information indicating the length of the third information table, the method of building the item information table comprising steps of:
reading the tag identifier of the RFID tag and storing it in the tag identifier of the RFID tag data structure which includes a tag serial number and a manufacturer identifier;
creating the item code, the item serial number, and the user serial number;
setting the item expiration date;
obtaining parameter values of the second information table which includes the receiving brief message phone number and default values for passwords;
setting the second sub-information and creating the first encrypted key;
creating a new second information table with parameter values stored in different ordering according to the tag serial number, the second password mask, and the original second information table;
obtaining parameter values of the third information table; and
storing the first information table, the second information table, and the third information table in the RFID tag.
36. A method of authenticating an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-35, the RFID TIPS including a set of system constants which including first password mask, length of first information table, length of second information table, length of third information table, CompType, AuthenticationType, and adjust ordering table, the RFID tag including a tag identifier and an item information table which being built in accordance with a plural authentication steps, the item information table including first information table and second information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and expiration date, the second information table including second authenticating information, receiving brief message phone number and second other information, the second sub-information indicating the length of the second information table, the third sub-information indicating the length of the third information table, the method comprising steps of:
selecting and inventorying the RFID tag;
reading the first information table;
verifying the length of the first information table and the item expiration date;
reading the tag identifier which includes a tag serial number and a manufacturer identifier;
decrypting the first encrypted key to obtain second sub-information;
verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system;
reading the second information table based on the second sub-information;
obtaining the original second information table by performing a set of unadjust ordering operation;
authenticating the second authentication information for using the second other information and the receiving brief message phone number;
reading and using the second other information based on the third sub-information; and
ending the communication dialog with the RFID tag.
37. A method of building an item information table in an RFID tag using encrypted keys for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-36, the RFID tag including a tag identifier and a tag memory, the tag memory being divided into memory sectors and blocks, the tag identifier including a tag serial number and a manufacturer identifier, the RFID TIPS allocating an RFID tag data structure and a set of system constants in its working memory, the set of system constants including length of first information table, length of second information table, length of third information table, CompType, and AuthenticationType, the RFID tag data structure including tag identifier, first memory block, second memory block, and third memory block, and an item information table being stored in the RFID tag data structure, the item information table including first information table, second information table, third information table, the first information table being stored in the first memory block, the second information table being stored in the second memory block, the third information table being stored in the third memory block, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and expiration date, the first encrypted key including an encrypted second sub-information, the first other information including item serial number, the second information table including second authenticating information, second encrypted key and second other information, the second authentication information including savings account password, counter service password, credit account password, compare failed count, cash card balance, and any arbitrary ordering of parameters, the second encrypted key including an encrypted third sub-information, the second other information including savings account number, credit account number, cash card information, and any arbitrary ordering of parameters, the cash card information including cash card store category, cash card merchant serial number, cash card balance monetary base, variable status code associated with cash card use, and cash card getting on station number, the third information table including a transfer account table, or a RFID access control table, or a receiving brief message phone number table, or a combination of the above, the second sub-information indicating the length of the second information table, the third sub-information indicating the length of the third information table, the method of building the item information table comprising steps of:
reading the tag identifier of the RFID tag and storing it in the tag identifier of the RFID tag data structure which includes a tag serial number and a manufacturer identifier;
creating the item code, the item serial number, and the user serial number;
setting the item expiration date;
obtaining plural parameter values of the second information table including default values for passwords;
setting the second sub-information and creating the first encrypted key;
obtaining parameter values of the third information table which includes the receiving brief message phone number table;
setting the third sub-information and creating the second encrypted key; and
storing the first information table, the second information table, and the third information table in the RFID tag.
38. A method of authenticating an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-37, the RFID TIPS including a set of system constants which including length of first information table, length of second information table, length of third information table, CompType, and AuthenticationType, the RFID tag including a tag identifier and an item information table which being built in accordance with a plural authentication steps, the item information table including first information table and second information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and expiration date, the second information table including second authenticating information, second encrypted key and second other information, the method comprising steps of:
selecting and inventorying the RFID tag;
reading the first information table;
verifying the length of the first information table and the item expiration date;
reading the tag identifier which includes a tag serial number and a manufacturer identifier;
decrypting the first encrypted key to obtain second sub-information;
verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system;
reading the second information table based on the second sub-information;
authenticating the second authentication information for using the second other information;
decrypting the second encrypted key to obtain third sub-information;
reading and using the second other information based on the third sub-information including selecting a receiving brief message phone number from the receiving brief message phone number table; and
ending the communication dialog with the RFID tag.
39. A method according to Embodiments 1-38, the RFID TIPS allocating an RFID tag data structure and a set of system constants in its working memory, the set of system constants further including a second password mask and an adjust ordering table, the method of building the item information table comprising steps of:
reading the tag identifier of the RFID tag and storing it in the tag identifier of the RFID tag data structure which includes a tag serial number and a manufacturer identifier;
creating the item code, the item serial number, and the user serial number;
setting the item expiration date;
obtaining plural parameter values of the second information table including default values for passwords;
setting the second sub-information and creating the first encrypted key;
creating a new second information table with parameter values stored in different ordering according to the tag serial number, the second password mask, and the original second information table;
obtaining parameter values of the third information table which includes the receiving brief message phone number table;
setting the third sub-information and creating the second encrypted key; and
storing the first information table, the second information table, and the third information table in the RFID tag.
40. A method of authenticating an RFID tag using encrypted key for a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-39, the RFID TIPS including a set of system constants which including second password mask, length of first information table, length of second information table, length of third information table, CompType, AuthenticationType, and adjust ordering table, the RFID tag including a tag identifier and an item information table which being built in accordance with a plural authentication steps, the item information table including first information table and second information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and expiration date, the second information table including second authenticating information, second encrypted key and second other information, the method comprising steps of:
selecting and inventorying the RFID tag;
reading the first information table;
verifying the length of the first information table and the item expiration date;
reading the tag identifier which includes a tag serial number and a manufacturer identifier;
decrypting the first encrypted key to obtain second sub-information;
verifying the second sub-information to authenticate the RFID tag for anti-counterfeiting and belonging to the same system;
reading the second information table based on the second sub-information;
obtaining the original second information table by performing a set of unadjust ordering operation;
authenticating the second authentication information for using the second other information;
decrypting the second encrypted key to obtain third sub-information;
reading and using the second other information based on the third sub-information including selecting a receiving brief message phone number from the receiving brief message phone number table; and
ending the communication dialog with the RFID tag.
41. A method of using a radio frequency identification tag item processing system (RFID TIPS) in a radio frequency identification information system (RFID IS) according to Embodiments 1-40, the RFID IS including a radio frequency identification authentication system (RFID AS), a database device, an internet, a wireless mobile network device, and an RFID tag, the RFID AS including RFID TIPS and other processing system, the RFID TIPS including a reader, a local computer, a numerical keypad, an antenna, a display, a RFID channel, a local computer network environment, a RFID environment, and a set of system constant values, the RFID tag including a tag identifier and a tag memory, the tag identifier including a tag serial number and a manufacturer identifier, the RFID tag being a device with item information table built in its tag memory, tag kill password and tag access password also being built in it, the item information table including first information table, second information table and third information table, the first information table including first authenticating information, first encrypted key and first other information, the first authenticating information including item code, user serial number and item expiration date, the first encrypted key including an encrypted second sub-information, the first other information including item serial number and first PC information, the first PC information indicating the length of the first information table, the second sub-information indicating the length of the second information table, the method of using the RFID TIPS comprising steps of:
the tag item operating system of local computer being started;
establishing the connection of local computer, accessing a local computer network environment, accessing a RFID environment, and setting a set of system constant values being executed;
the RFID TIPS being started to verify the local computer network environment including a database device;
the RFID TIPS selecting an item processing mode based on item processing mode (IPMode) which including item operation (OPERATION), item service (SERVICE), and item test (TEST), wherein:
when IPMode=OPERATION, the item processing mode comprising steps of:
starting the reader including setting the RFID environment;
reading an RFID tag by select, inventory and query report instructions according to item code;
receiving a first information table including an encrypted key, item code, item serial number and user serial number;
verifying the length of the first information table to ensure the selected RFID tag matching the system select conditions and reading the tag identifier;
when passing the verifying the length of the first information table, selecting an item application category according to RFID business sub-code of the item code and computer type (CompType), the CompType including pay cash, smart cashier, counter service computer, workstation, aATM, nuFAD, logistics, supply chain, access control, item level tracking, transportation, technology, and system reserved uses, the item application category includes access control, supply chain, (logistics and other business applications), pay cash, and (Finance, counter service, aATM or nuFAD), wherein:
when item application category being access control, proceeding to perform an access control item processing procedure which including decrypting the encrypted key to authenticate the RFID tag for anti-counterfeiting and belonging to the same system; recording the event which includes sending a brief message or email to a receiving brief message phone number; ending the communication dialog with the RFID tag;
when item application category being supply chain, proceeding to perform a supply chain item processing procedure which including decrypting the encrypted key to authenticate the RFID tag for anti-counterfeiting and belonging to the same system; recording the event which including sending a brief message or email to a receiving brief message phone number; ending the communication dialog with the RFID tag;
when item application category being logistics and other business applications, proceeding to perform an item processing procedure for logistics and other business applications which including decrypting the encrypted key to authenticate the RFID tag for anti-counterfeiting and belonging to the same system; recording the event which including sending a brief message or email to a receiving brief message phone number; ending the communication dialog with the RFID tag;
when item application category being pay cash, proceeding to perform a pay cash item processing procedure which including decrypting the encrypted key to authenticate the RFID tag for anti-counterfeiting and belonging to the same system; using cash card balance to pay expense amount and add cash to cash card balance; recording the event which including sending a brief message or email to a receiving brief message phone number; ending the communication dialog with the RFID tag;
when item application category being (Finance, counter service, aATM or nuFAD), proceeding to perform an item processing procedure for Finance, counter service, aATM or nuFAD application which including decrypting the encrypted key to authenticate the RFID tag for anti-counterfeiting and belonging to the same system; comparing the authentication information to the entered authentication password; reading a second information table when passing the plural authenticating steps; obtaining the original second information table which including a savings account number by performing a set of unadjust ordering operation; using the savings account number for a deposit, withdraw, or transfer transaction; recording the event which including sending a brief message or email to a receiving brief message phone number; ending the communication dialog with the RFID tag;
when IPMode=SERVICE, the item processing mode comprising steps of:
selecting an item service type (ServiceType), the ServiceType including build tag item, inquire tag item, and modify tag item, wherein:
when ServiceType being build tag item, proceeding to perform a build tag item processing procedure which including building an item information table in a new RFID tag based on item code and item serial number, recording the event, and ending the communication dialog with the RFID tag;
when ServiceType being inquire tag item, proceeding to perform a inquire tag item processing procedure which including inquiring an item information table in an RFID tag based on item code and item serial number, recording the event which including sending a brief message or email to a receiving brief message phone number, and ending the communication dialog with the RFID tag;
when ServiceType being modify tag item, proceeding to perform a modify tag item processing procedure which including modifying an item information table in an RFID tag based on item code and item serial number, recording the event which including sending a brief message or email to a receiving brief message phone number, and ending the communication dialog with the RFID tag; and
when IPMode=TEST, the item processing mode comprising steps of:
selecting an item test type (TestType) according to the RFID business sub-code of the item code, the TestType including financial industry and other test industries, the other test industries including access control, supply chain, logistics, item level tracking, transportation, technology, and system reserved uses, wherein:
when TestType being financial industry, proceeding to perform a financial industry item processing procedure which including building and testing an item information table in an RFID tag which includes start the reader, test of building an item information table, test of writing the item information table, test of reading the item information table, test of authenticating the RFID tag for anti-counterfeiting, test of comparing the authentication password, test of adjust ordering of an information table, test of unadjust ordering of an information table, test to pay cash by the cash card balance and select its monetary base, test of generating a test report, and ending the communication dialog with the RFID tag; and
when TestType being other test industries, proceeding to perform an other test industry item processing procedure which including building and testing an item information table in an RFID tag memory, recording the event, and ending the communication dialog with the RFID tag.
42. The method of Embodiments 1-41, wherein establishing the connection of local computer, accessing a local computer network environment, accessing a RFID environment, and setting a set of system constant values being executed further comprises:
establishing the connection of local computer which includes connecting the local computer by way of cable, radio, or both cable and radio to internet and mobile radio network through an internet service provider for accessing a common database device, and sending a brief message or email;
accessing a local computer network environment which includes name of the local computer, or its code number, and its internet address, name of the other computer, or its code number, and its internet address, name of the database device, or its code number, and its internet address;
accessing a RFID environment includes location serial number of the reader and its session number, channel band, connecting frequency, pulse width, modulation mode, bit transmitting speed, and antenna port number, its location serial number and its transmit power level;
setting a set of system constant values which includes a set of internal parameter values and a set of exterior parameter values, the set of internal parameter values includes a local computer type (CompType), the CompType includes pay cash, smart cashier, counter service computer, workstation, aATM, nuFAD, logistics, supply chain, access control, item level tracking, transportation, technology, and system reserved uses, the set of exterior parameter values includes item processing mode (IPMode), service type (ServiceType), test type (TestType), first password mask, second password mask, length of first information table, length of second information table, length of third information table, maximum compare failed count, AuthenticationType, hash table, and adjust ordering table, wherein the IPMode includes item operation (OPERATION), item service (SERVICE), and item test (TEST), the ServiceType includes build tag item, inquire tag item, and modify tag item, the TestType includes financial industry and other industry, the AuthenticationType includes credit account authentication, savings account authentication, finance authentication, logistics authentication, supply chain authentication, and access control authentication.
43. A device used in a radio frequency identification information system (RFID IS) according to Embodiments 1-42, the device including a radio frequency identification tag item processing system (RFID TIPS) and an RFID tag, the device comprising characteristics of:
the RFID tag comprising characteristics of:
the RFID tag including a tag identifier and a tag memory, an interface and communication controlling circuit, and an antenna, the tag identifier which including a tag serial number and a manufacturer identifier, the tag memory being divided into memory sectors and blocks, comprising characteristics of:
the interface and communication controlling circuit including UHF communication interface protocol, HF communication interface protocol, other UHF communication interface protocol, or combination of a UHF communication interface protocol and a HF communication interface protocol for establishing communication with a reader of the RFID TIPS and sending information to each other;
the antenna including UHF antenna, HF inductive coil, or combination of a UHF antenna and a HF inductive coil;
the tag memory storing an item information table which being built in accordance with a plural authentication steps, the item information table including first information table, second information table and third information table, wherein:
the first information table including item code, item serial number, user serial number, and first encrypted key, comprising characteristics of:
the first encrypted key being an unique key created by combining the tag identifier, item serial number and the user serial number, used by the RFID TIPS to authenticate the RFID tag for anti-counterfeiting and belonging to the same system;
the item code, item serial number and user serial number being a set of encoded parameters, used by the RFID TIPS to select and inventory RFID tag for establishing communication, wherein the item code including RFID business sub-code, RFID device sub-code, RFID selecting enable function sub-code, RFID function sub-code, RFID deployment country sub-code, and any combination of above sub-codes, the item serial number including organization of a RFID business sub-code;
the second information table including second authentication information, receiving brief message phone number, and second other information, comprising characteristics of:
the ordering of parameters stored in the second information table being adjusted based on the tag identifier for eavesdropping of parameters in the information table; and
the receiving brief message phone number being used for receiving the brief message sent from the RFID TIPS; and
the third information table including a transfer account table, a RFID access control table, a receiving brief message phone number table, or a combination of the above;
the RFID TIPS comprising characteristics of:
the RFID TIPS including a reader, an antenna, a local computer, a numerical key pad unit, and a display unit, comprising characteristics of:
the reader including a UHF reader, a HF reader, or combination of a UHF reader and a HF reader;
the reader including an interface and communication controlling circuit which including UHF communication interface protocol, HF communication interface protocol, other UHF communication interface protocol, or combination of a UHF communication interface protocol and a HF communication interface protocol for establishing communication with an RFID tag and sending information to each other;
the antenna including UHF antenna, HF inductive coil, or combination of a UHF antenna and a HF inductive coil;
the local computer including device for executing the RFID TIPS' program, accessing database device, and communicating transaction brief message;
the numerical key pad unit including device for entering information required by the RFID TIPS; and
the display unit including device for receiving and displaying output messages from the RFID TIPS.
44. A system using a radio frequency identification tag item processing system (RFID TIPS) according to Embodiments 1-43, the system including a radio frequency identification information system (RFID IS) which including an RFID tag, an radio frequency identification authentication system (RFID AS), a network connecting device, an internet, a database device, and a mobile radio network device, the system comprising characteristics of:
the RFID tag comprising characteristics of the RFID tag as described in Embodiment 43;
the RFID AS including a RFID TIPS and a network join, comprising characteristics of:
the RFID TIPS comprising the RFID TIPS as described in claim 43 for establishing communication with the RFID tag, the network join connecting the RFID TIPS with the network connecting device, the RFID TIPS being joined with internet and mobile radio network device via the network join and the network connecting device; and
the network join including device to provide a radio network channel, the RFID TIPS being joined with internet and mobile radio network device wirelessly via the network join and the network connecting device;
the network connecting device joining the RFID AS and internet;
the internet including devices and systems joining the network connecting device, database device, and mobile radio network device, which including joining mobile radio network, local area network (LAN) of RFID AS, wireless LAN, or/and composite LAN;
the database device including characteristics of permitting the connecting with the RFID IS for add, inquire, modify or delete its transaction information; and
the mobile radio network device including mobile radio device and system subscribed to a mobile radio network.
45. The system of Embodiments 1-44, wherein the system includes a radio frequency identification information system (RFID IS) which includes an RFID tag, a radio frequency identification authentication system (RFID AS), a network connecting device, an internet, a database device, and a mobile radio network device, using the system includes characteristics of:
the RFID AS including a RFID TIPS and a network join, using the RFID TIPS comprises characteristics of:
the RFID TIPS building an item information table with encoded parameters in an RFID tag in accordance with a plural authentication steps, wherein the item information table includes first information table, second information table and third information table, comprises characteristics of:
the first information table includes first authenticating information, first encrypted key and first other information, the second information table includes different parameters for different RFID business, the parameters including second authentication information, savings account number, credit account number, cash card balance information, receiving brief message phone number, RFID access control table, item level tracking table, product manufacturing information table, receiving brief message phone number table, start control table, or a combination of the above; creating item kill password and item access password according to the tag identifier of the RFID tag; and adjusting ordering of parameters in the second information table according to the tag identifier of the RFID tag;
the RFID TIPS authenticating an RFID tag in accordance with a plural authentication steps, comprises characteristics of:
selecting and inventorying the RFID tag based on the item code, item serial number and user serial number for reading its first information table; reading the tag identifier which includes a tag serial number and a manufacturer identifier; decrypting the first encrypted key to authenticate the device for anti-counterfeiting and belonging to the same system; obtaining the original second information table by performing a set of unadjust ordering operation; and authenticating the second authentication information for using the second other information including sending a brief message to the receiving brief message phone number;
the network join connecting the RFID TIPS with the network connecting device, the RFID TIPS is joined with internet and mobile radio network device via the network join and the network connecting device, using the RFID TIPS and its characteristics are comprises but not limited to the systems of:
a RFID authentication system, wherein authenticating an authentication card to proceed a financial service which includes select cash card balance monetary base, pay cash, and sending a brief transaction message, the RFID tag of the authentication card includes an item information table which includes first information table, second information table and third information table, wherein the second information table includes a set of authentication passwords, a cash card monetary information, and a receiving brief message phone number, the set of authentication passwords includes a counter service password, the cash card monetary information includes cash card balance and cash card balance monetary base;
an authentication Automatic Teller Machine (aATM), wherein authenticating an authentication card to proceed an unmanned financial service which includes transfer an amount of cash to the authentication card, change the receiving brief message phone number, select cash card balance monetary base, pay cash, and sending a brief transaction message, the RFID tag of the authentication card includes an item information table which includes first information table, second information table and third information table, wherein the second information table includes a set of authentication passwords, a cash card monetary information, and a receiving brief message phone number;
a driveway toll management system, wherein authenticating an authentication card to proceed a driveway toll service which includes long distance toll collecting, sending brief transaction message, the RFID tag of the authentication card includes an item information table which includes first information table and second information table, wherein the second information table includes a cash card monetary information and a receiving brief message phone number, the cash card monetary information includes a cash card balance;
a RFID access control management system, wherein authenticating an authentication card to proceed a controlled area access service which includes long distance driveway control, controlled area access, starting electric facilities in an access controlled area, and sending brief transaction message, the RFID tag of the authentication card includes an item information table which includes first information table and second information table, wherein the second information table includes a start control table and a receiving brief message phone number;
a financial access control management system, wherein authenticating an authentication card to proceed a financial or controlled area access service which includes financial service, controlled area access, pay cash, and sending a brief transaction message, the RFID tag of the authentication card includes an item information table which includes first information table, second information table and third information table, wherein the second information table includes a set of authentication passwords, a cash card monetary information, and a receiving brief message phone number, the third information table includes a transfer account table, a RFID access control table, and a receiving brief message phone number table;
a RFID timekeeping authentication system, wherein authenticating an authentication card to proceed a controlled area access service which includes timekeeping employee's work hours, controlled area access, and sending brief transaction message, the RFID tag of the authentication card includes an item information table which includes first information table and second information table, wherein the second information table includes an authentication password, a RFID access control table and a receiving brief message phone number; and
a RFID product manufacturing authentication system, wherein authenticating an authentication card or adhesive tag to proceed an item level tracking service which includes process management, testing, and QC sampling for product manufacturing, the RFID tag of the authentication card or adhesive tag includes an item information table which includes first information table and second information table, wherein the second information table includes a set of authentication passwords, a product code, a process code number, a lot number, a quantity, a current process station name or number and a receiving brief message phone number;
the network join further including device to provide a radio network channel, the RFID TIPS is joined with internet and mobile radio network device wirelessly via the network join and the network connecting device, making of the RFID TIPS comprises but not limited to the systems of:
a wireless RFID authentication reader, which configures local computer, reader, reader antenna, display unit, and key pad unit all in a device enclosed by a plural pieces of plastic case; and
a handheld wireless RFID authentication reader, which configures local computer, reader, reader antenna, display unit, and key pad unit all in a device enclosed by a plural pieces of plastic case, one piece further having a plain surface platform, or its shape of a handle or stand;
the RFID AS including a RFID TIPS and a network join, the RFID TIPS further includes a second radio channel, using the RFID AS and its characteristics comprises but not limited to the systems of:
a RFID merchant vending authentication system, wherein authenticating an authentication card to proceed a vending fee collect service which includes measuring the weight or volume of a vending merchant, the RFID tag of the authentication card includes an item information table which includes first information table and second information table, wherein the second information table includes an authentication password, a cash card monetary information, and a receiving brief message phone number, the cash card monetary information includes cash card balance, merchant unit price, purchasing amount, and merchant weight or volume;
a parking lot fee collect system, wherein authenticating an authentication card to proceed a parking lot fee collect service which includes measuring the parking time period, the RFID tag of the authentication card includes an item information table which includes first information table and second information table, wherein the second information table includes an authentication password, a cash card monetary information and a receiving brief message phone number, the cash card monetary information includes cash card balance, entering time, parking category and discount, and parking lot use state;
a radio transportation toll collecting system, wherein authenticating an authentication card to proceed a transportation toll collecting service which includes measuring the travel distance, pay cash, sending brief transaction message, the RFID tag of the authentication card includes an item information table which includes first information table and second information table, wherein the second information table includes an authentication password, a cash card monetary information and a receiving brief message phone number, the cash card monetary information includes cash card balance, cash card use state, and travel start station name or number;
the RFID AS further including devices and systems of an other processing system and a network join, the other processing system includes processing system being the same as a RFID TIPS, the other processing system further includes other devices including reader, electronic scale, barcode scanner, network scanner, network camera, fluid meter, or GPS coordinate locating device, using the other processing system and its characteristics comprises but not limited to the systems of:
an asset management authentication system, wherein authenticating an authentication card to proceed an asset management service which includes controlled area access authentication, asset management system authentication, and sending brief transaction message, the RFID tag of the authentication card includes an item information table which includes first information table and second information table, wherein the second information table includes an authentication password, a RFID access control table and a receiving brief message phone number;
a RFID cross-area access control management system, wherein authenticating an authentication card to proceed a controlled area access service which includes cross-area long distance driveway control, cross-area controlled area access, starting electric facilities in an access controlled area, and sending brief transaction message, the RFID tag of the authentication card includes an item information table which includes first information table and second information table, wherein the second information table includes an authentication password, a RFID access control table and a receiving brief message phone number;
a network used financial authenticating device (nuFAD), wherein authenticating an authentication card to proceed a financial service which includes transfer an amount of cash to the authentication card, change the receiving brief message phone number, select cash card balance monetary base, pay cash, and sending a brief transaction message, the RFID tag of the authentication card includes an item information table which includes first information table, second information table and third information table, wherein the second information table includes a set of authentication passwords, a cash card monetary information, and a receiving brief message phone number;
using the database device comprises characteristics of:
adding, inquiring, modifying or deleting name or code number of RFID IS, name or code number of RFID AS, name or code number of RFID TIPS, parameters or its code number used in item information table of electronic table;
inquiring name or code number, address, and telephone number of company or organization based on business unified serial number;
inquiring name or code number, area, location, building and building floors and building rooms, address and telephone number of community;
inquiring account balance and account information based on country, bank and its branch name, savings account number and password;
inquiring name or code number of business store and its branch, name or code number of merchant, name or code number of transportation company, its travel route, station and timetable, name or code number of merchant, name or code number of airline company, its travel route, flight number and flight schedule, name or code number of railroad company, its travel route, station and timetable, name or code number of mass rapid transit (MRT) system, its travel route, station and timetable, name or code number of travel company, its travel route, station and timetable; and
adding, inquiring, modifying or deleting transaction information from RFID AS or RFID TIPS, the transaction information including financial transaction information, controlled area access information, merchant purchasing information, and product manufacturing information; and
using the mobile radio network device comprises characteristics of:
an authenticated mobile phone or a display unit using GSM, GPRS service;
an authenticated mobile phone or a display unit using GSM, GPRS and internet service; and
a mobile device including a display unit with IP address or a receiving brief message phone number which receives brief message, image, or both brief message and image via internet.
While the invention has been described in terms of what is presently considered to be the most practical and preferred embodiments, it is to be understood that the invention needs not be limited to the disclosed embodiments. On the contrary, it is intended to cover various modifications and similar arrangements included within the spirit and scope of the appended claims, which are to be accorded with the broadest interpretation so as to encompass all such modifications and similar structures.
Number | Date | Country | Kind |
---|---|---|---|
102105419 | Feb 2013 | TW | national |
This application a continuation-in-part of U.S. patent application Ser. No. 16/681,201, filed on Nov. 12, 2019, which is a continuation-in-part of U.S. patent application Ser. No. 14/175,630, filed on Feb. 7, 2014, claiming foreign priority as well as to TW-102105419, filed on Feb. 8, 2013, the disclosures of which are incorporated herein in their entirety by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 16681201 | Nov 2019 | US |
Child | 17383714 | US | |
Parent | 14175630 | Feb 2014 | US |
Child | 16681201 | US |