The present invention will become more fully understood from the detailed description given hereinbelow and the accompanying drawings which are given by way of illustration only, and thus, are not limitive of the present invention, and wherein:
An access authorization to a memory area of a transponder is specified by the access control information. According to the invention, access control information comprises a master access control information and at least one first sub-access control information, by which the master access control information is scaled, so that an individual setting of an access authorization can be specified. In an embodiment, the master access control information and the sub-access control information are each formed by a bit pattern, comprising two bits in each case.
The master bits MB are, for example, the lock bits known from the aforementioned draft standard (see, for example, ISO/IEC_CD 18000-6C 6.3.2.10.3.5). In an advantageous embodiment, the master bits MB are assigned the following meaning:
In another embodiment (not shown), only a master bit is present, which assumes either the value “0” or the value “1,” whereby, for example, there is no write protection at the value “0” and the memory area is protected at least against writing at the value “1.”
The authorization can be scaled further by means of the sub-bits SB, i.e., can be adapted to specific requirements. The setting options thereby depend, inter alia, on other transponder settings. For compatibility with transponders without scaling capabilities, in an embodiment a pattern or configuration of the sub-bits is assigned the “unscaled” option, for example, the pattern “00”.
In a first exemplary embodiment, a transponder of this type is set in such a way that the transponder is assigned only one identifier (ID). Possible settings for access to the memory area are given in the following table; the bit patterns of the master bits are shown in the first column and the bit patterns of the sub-bits in the second column.
These settings, assigned to the different bit patterns of the master bits and sub-bits, are of course only one possibility for adapting the transponder to different requirements. Here, in the exemplary embodiment, the entire memory area is assigned a common access control.
In an embodiment, further fine setting of the access control by second sub-bits is possible. Thus, it is conceivable, for example, that the access control information comprising the following bit pattern “11 11” of the master bits MB “11” and the sub-bits SB “11” is overloaded. If additional second sub-bits are present, these are then utilized to perform a further setting or scaling.
In a second exemplary embodiment, one bit or a plurality of bits, particularly four bits, are provided as a second sub-access control information. In the exemplary embodiment, a setting, which affects the entire memory area of the transponder, can be made by the master bits and the first sub-bits. It is further possible by means of the second sub-bit or the second sub-bits to divide the memory area into any number of memory blocks, whereby the read and/or write access to the specific memory block can be set by the second sub-bit or the second sub-bits, particularly in the case of four sub-bits by a bit pattern with four bits according to
In the depicted embodiment the access control information a to d comprises at least eight bits.
If the first master bits MB and the first sub-bits SB have the indicated bit pattern “1111,” it is then signaled that further information may follow. The next four bits then serve for the selective setting of access control in memory area A. If no further information follows, the bit pattern “1111” signals, for example, as described above, that neither writing nor reading is possible. The bit pattern is thereby overloaded and the memory is thereby individually configurable.
The next eight bits serve to set access authorization to a memory block B.
Access control information e is not followed by any other sub-bits, so that the access control information, for example, can also apply to memory blocks coming after memory block E, if such subsequent memory blocks are present.
The aforementioned draft standard specifies that a permalock bit once it is set cannot be cleared again.
According to the invention, each memory block A-E is assigned further at least one sub-access control information a-e, comprising at least one sub-bit or block bit, whereby access to an associated memory block A-E can be blocked by the block bit contrary to general access control information M1, M2. The block sub-bit is subordinate to the master bits; i.e., when the master bits have the aforementioned configuration “01” according to which the entire memory area cannot be write protected, a set block sub-bit is ignored and/or a setting of the block sub-bit is prevented. The block sub-bit in an embodiment is designed to be one-time programmable, whereby a set state is not reversible. In an initial configuration of the transponder, for example, all sub-bits are not set. Individual memory blocks A-E can then be protected from writing (permanently) by setting of the specific sub-bits.
In another embodiment, more than one sub-bit per sub-access control information a-e is provided, for example, four sub-bits, as shown in
In again different embodiments, in each case, two or more memory blocks can be assigned a common sub-bit.
During use, a transponder or a tag is used, for example, in conjunction with a sensor to monitor, for example, chilled goods, whereby temperature profiles can be stored in the transponder in a memory area, provided for this, by the sensor. To prevent the temperature profiles from being falsified, for example, in order to fake adherence to legally stipulated quality standards, this memory area and/or a memory block or several memory blocks of the memory area are to be protected from overwriting by reader units from the outside, for example, via the so-called radio interface. At the same, it should be possible in the indicated example to release other memory blocks and/or other memory areas for writing for certain users, so that, for example, during a transfer of risk an authorized user can record this in the transponder using a time stamp. It is obvious that it is not desirable in this case that successive users in the logistics chain have write access to the same memory blocks. Otherwise a subsequent user could again correct at any time his time of the transfer of risk. The different users are each given, for example, a password, whereby with use of this password they are granted write access to a memory block allocated to them. Read access can also be blocked or released with conditions. Subdivision into several memory blocks with different access authorizations can thus reduce the risks for a carrier in the logistics chain.
In another exemplary embodiment, a transponder is configured with two identifiers ID1, ID2. The two password areas typically present in the transponder are then assigned to the two identifiers ID1, ID2. This results in the setting options shown in the following table:
In this case, the bit sequence “1111” is overloaded in an embodiment. If a second sub-access control information is present, then, for example, the bit sequence “1111” only determines that no writing is possible. A read authorization can be defined by a second sub-access control information.
In another exemplary embodiment, the memory area is allocated to the EPC. Here, a setting is carried out by the method of the invention in such a way that without sub-bits the write protection specified by the master bits, i.e., preferably the lock bits, applies only to a first identifier ID1. If, on the contrary, there is sub-access control information of the invention, then the following functions can be set depending on the sub-access control information of the invention: (1) The EPC is transmitted only with the use of a read command (“read” command according to draft standard; see, for example, ISO/IEC_CD 18000-6C 6.3.2.10.3.2); (2) the EPC is output encoded with the use of the read command; (3) the second identifier ID2 and/or any other information are output encoded after an acknowledge command; and/or (4) subsettings apply only to the additional identifiers.
The listed setting options are exemplary. It is apparent that other functions can be assigned to the individual access control information; in each case, a rough setting occurs by means of the master access control information and a fine setting by one or more subordinate sub-access control information.
The invention being thus described, it will be obvious that the same may be varied in many ways. Such variations are not to be regarded as a departure from the spirit and scope of the invention, and all such modifications as would be obvious to one skilled in the art are to be included within the scope of the following claims.
Number | Date | Country | Kind |
---|---|---|---|
DE 102006032129 | Jul 2006 | DE | national |
Number | Date | Country | |
---|---|---|---|
60819387 | Jul 2006 | US |