The present invention relates to a radio frequency identifier (RFID) tag device and an authentication method for the same, and more particularly, to an RFID tag apparatus which can be used for authentication and anti-hacking and which can measure conditions of the surrounding environment, and an authentication method for the same.
An RFID is a chip attached with an antenna. Data stored in the chip can be wirelessly transmitted the antenna. The RFID tag may be used in various fields such as product identification and vehicle identification. An RFID tag attached to a product includes data regarding the product and a purchaser. The RFID tag may be embedded onto packaging of the product, a library book, a credit card, an identification card, a driver's license, or a passport. Product management can be conveniently achieved using the RFID tag attached to a product in a store or a warehouse, or a rack support of the product. Moreover, the RFDIG tag may be embedded in an electronic toll pass or a key chain.
Authentication is required so as to avoid not only illegal use of an identification service of the RFID tag but also counterfeiting and modification of the RFID tag.
The present invention provides a radio frequency identifier (RFID) tag apparatus including an authentication module in order protect RFID tag information therein and measure conditions of the surrounding environment such as temperature or moisture, and an authentication method for the same.
According to an aspect of the present invention, there is provided an RFID tag apparatus including a device, a device recognizing unit, an RF processor, and a controller. The device receives a first signal and outputs a second signal in response to the first signal. The device recognizing unit outputs the first signal to the device in response to a control signal and receives the second signal to output n-bit data, where n is an integer greater than 1. The RF processor receives an RF signal and extracts information from the RF signal. The controller outputs the control signal to the device recognizing unit in response to the information and processes the n-bit data in response to the information.
According to another aspect of the present invention, there is provided a method for authenticating an RFID (radio frequency identifier) tag including a device adapted to receive a first signal and output a second signal in response to the first signal. In the method, the first signal is output to the device. The second signal is received from the device to generate n-bit data, where n is an integer greater than 1. The n-bit data is compared with n-bit data stored in the storage unit to perform authentication.
According to the present invention, the security of the RFID tag is intensified by authenticating the RFID tag using device values output from a device internally or externally provided to the RDIF tag. It is also possible to determine whether a product to which the RFID tag is attached is genuine or whether the product to which the RFID tag is attached is damaged.
In addition, the device values output from the device including environmentally sensitive elements and internally or externally provided to the RFID tag may be used to determine whether a system internally and externally including the aforementioned device is secure against the surrounding environment.
The above and other features and advantages of the present invention will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings in which:
Hereinafter, the present invention will be described in detail by explaining exemplary embodiments of the invention with reference to the attached drawings.
The RFID tag includes an RF processor 10, a controller 11, a security unit 12, a storage unit 13, and a device recognizing unit 14. A device 16 connected to the device recognizing unit 14 is internally or externally provided to the RFID tag. A serial/parallel interface unit 15 may be included in the RFID tag.
The RF processor 10 converts a received RF signal into digital data and extracts information contained in the RF signal. The RF processor 10 also converts necessary data into an RF signal to be transmitted. The controller 11 controls operations of respective elements. The security unit 12 decrypts the information extracted from the RF signal or encrypts data to be transmitted in an RF signal, for the data security. Various memories such as a read-only memory (ROM), a random-access memory (RAM), and an electrically erasable programmable read-only memory (EEPROM) may be used as the storage unit 13 depending on whether the controller 11 is a central processing unit (CPU). The storage unit 13 stores data used in encryption/decryption and an operation system of an RFID tag executed by the controller 11. The device recognizing unit 14 outputs data by using a signal output from the device 16 which is internally or externally provided to the RFID tag. The device 16 may be implemented with sensor devices which output values that vary depending on the external environments, or of which output fixed values regardless of the external environments. The serial/parallel interface unit 15 transmits data output from the device recognizing unit 14 to a mobile terminal such as a mobile phone or a personal digital assistant, or receives data from the mobile terminal.
Referring to
The RFID tag 21 may be directly connected to a mobile terminal 22 the serial/parallel interface unit 15 as shown in
Referring to
The ASP 31 includes a current source 311, a switch S1, a capacitor Csen, and a comparator 312. The switch 51 is turned on/off in response to a control signal output from the DLP 32. When the switch S1 is turned off, the capacitor Csen is charged by a current Isen generated by the current source 311. If a charge voltage Vsen is greater than a threshold voltage Vth, an output of the comparator 312 is shifted from a first level to a second level. Here, the comparator 312 may be a Schmitt trigger.
The DLP 32 includes a control logic unit 321 and a counter 322.
The control logic unit 321 receives a control signal S_en from the controller 11 illustrated in
The counter 322 is an n-bit counter starts counting in response to the count enable signal and continues the counting until a count disable signal is received. The latch 33 latches and outputs a count value output from the counter 322 in response to a latch enable signal.
The latch 33 latches a value obtained from the counting to the controller 11.
In the ASP 34, a current Isen flowing through a capacitor Csen is generated by a current mirror 341 connected to a supply voltage Vdd.
In the ASP 35, a current Isen flowing through a capacitor Csen is equal to a current flowing through a resistor Rsen connected to a supply voltage Vdd.
In the ASP 36, a reference voltage Vth of a comparator 361 is determined to be a voltage across a resistor Ra when a current Isen generated by a current source 311 flows through the resistor Ra. A voltage Vsen input to the comparator 361 is generated by an n-bit count value (where n is an integer greater than 1) output from a counter 322 of the ASP 36.
The operation of the ASP 36 will now be described in detail. A Vsen generator 362 includes n current sources 3621, n switches 3622, a switch S1, a resistor Rda, and a capacitor Cda. Here, only either the resistor Rda or the capacitor Cda may be included in the Vsen generator 362.
The n current sources 3621 generate a current Ir that sequentially increases from a least significant bit (LSB) in response to the n-bit count value. Each of the n switches 3622 is turned on/off by the n bit count value of the counter 322. When the switch S1 is turned off in response to a control signal of the control logic unit 321, the capacitor Cda is charged through switches turned on according to the n-bit count value among the n switches 3622. The charged voltage is supplied to the comparator 361 as Vsen. The same applied when the resistor Rda is excluded. Meanwhile, when only the resistor Rda is included, a voltage across the resistor Rda when a current flows through the resistor Rda is supplied to the comparator 361 as Vsen.
In the ASP 38, a reference voltage Vth of the comparator 381 is determined as a voltage across the resistor Ra when a current Isen generated by the current source 311 flows through the resistor Ra. A voltage Vsen input to the comparator 381 is generated by a voltage generator 382.
The voltage generator 382 includes a current source 3821, a capacitor Cin, and a switch S1. When the switch S1 is turned off by a control signal output from the control logic unit 321, the capacitor Cin is charged by a current Jr generated by the current source 3821. The charged voltage is supplied to the comparator 381 as Vsen.
The circuits illustrated in
According to the structures illustrated in
Referring to
Referring to
First, the controller 11 requests device values to the device recognizing unit 14 (operation 61). In response to the request, the controller 11 receives the device values recognized by any one of the circuits illustrated in
First, the controller 11 requests device values to the device recognizing unit 14 (operation 64). In response to the request, the device values are received from the device recognizing unit 14 (operation 65). The controller 11 reads device values from the storage unit 14 (operation 66) and compares the read device values with the received device values (operation 67). If the two device values are identical, the RFID tag 21 is determined to be valid, and the RFID tag 21 is turned on be operated (operation 68).
If the two device values are not identical, the controller 11 determines that the RFID tag 21 is damaged by counterfeiting or the like. Then, the controller 11 stops the operation of the RFID tag 21 and turns off the RFID tag 21 (operation 69). In this operation, the RFID reader 20 can display the fact that the RFID tag 21 is turned off.
a) and 7(b) illustrate that one or more devices 16 are present outside REID tag chips 72 and 73. In
a) and 8(b) illustrate that one or more devices 16 are present inside RFID tag chips 82 and 83. In
Here, as shown in
When an RFID tag is connected to the device 16 and attached to a product or when an RFID tag including the device 16 is attached to the product, it is effective to check whether the product is genuine or counterfeited. It is because the device 16 becomes useless when the device 16 is physically transformed or damaged.
Number | Date | Country | Kind |
---|---|---|---|
10-2005-0118785 | Dec 2005 | KR | national |
10-2006-0075804 | Aug 2006 | KR | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/KR06/05249 | 12/6/2006 | WO | 00 | 5/14/2008 |