CN100412880C - Radio frequency identifying secrete system and method - Google Patents

Radio frequency identifying secrete system and method Download PDF

Info

Publication number
CN100412880C
CN100412880C CNB2005100687289A CN200510068728A CN100412880C CN 100412880 C CN100412880 C CN 100412880C CN B2005100687289 A CNB2005100687289 A CN B2005100687289A CN 200510068728 A CN200510068728 A CN 200510068728A CN 100412880 C CN100412880 C CN 100412880C
Authority
CN
China
Prior art keywords
user
identification
reader
password
electron device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100687289A
Other languages
Chinese (zh)
Other versions
CN1858771A (en
Inventor
龚绍祖
沈一弘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Compal Electronics Inc
Original Assignee
Compal Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Compal Electronics Inc filed Critical Compal Electronics Inc
Priority to CNB2005100687289A priority Critical patent/CN100412880C/en
Publication of CN1858771A publication Critical patent/CN1858771A/en
Application granted granted Critical
Publication of CN100412880C publication Critical patent/CN100412880C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a radio frequency identification secrecy system and a method. The radio frequency identification secrecy system comprises a radio frequency identification tag and a portable electronic device, wherein the radio frequency identification tag is provided with a user identification code; the portable electronic device comprises a reader, an identification memory unit and an identification controller, wherein the reader can be used for establishing communication with the radio frequency identification tag and receiving the user identification code; the identification memory unit can be used for storing a user cipher; the identification controller is electrically connected with the reader and the identification memory unit, and can compare the user identification code and the user cipher. When the user identification code is the same with the user cipher, the identification controller can emit opening signals to open the usage permission of the portable electronic device.

Description

Radio frequency identifying secrete system and method
Technical field
The present invention relates to a kind of radio frequency identification system, and particularly relates to a kind of device and method of controlling the rights of using of portable electron device by RFID tag.
Background technology
Along with the progress of science and technology, portable electron device miscellaneous makes rapid progress, and develops towards light, thin, short, little direction, even possesses the function of communication or connected network, as mobile computer, PDA(Personal Digital Assistant) and mobile phone etc.And portable electron device develops towards directions such as multi-functional compound and personal information management one after another, so the confidentiality of its information is quite important.
The secrecy system that generally is used for portable electron device is normally controlled user's rights of using by the mode (for example startup password or user's password) of input password, invades improperly and destroys to prevent the external world.But this password may be cracked, and the secret mode of this kind must manually input password often, for user's very trouble that seems in operation.Another kind of new secrecy system is the rights of using that the mode of employing fingerprint recognition is controlled the user.Yet the identification plate that the secret mode of this fingerprint is used may influence its discrimination because of the dirty or long-term wearing and tearing of using the back to be produced.Generally speaking, its fingerprint recognition poor effect therefore neither a kind of desirable secret mode.
Summary of the invention
The purpose of this invention is to provide a kind of radio frequency identifying secrete system, use contactless radio frequency identification mode (Radio Frequency Identification; RFID) control the rights of using of portable electron device, to improve known contact recognition method easy crack, manually to import problem loaded down with trivial details and that discrimination is not good.
The object of the invention to solve the technical problems realizes by the following technical solutions.In order to reach the foregoing invention purpose, according to a preferred embodiment of the present invention, this radio frequency identifying secrete system comprises a RFID tag and a portable electron device.This RFID tag comprises a label antenna, a tag memory cell and a label controller.Label antenna is in order to reception reader identification sign indicating number, and tag memory cell is then in order to store the reader password.Label controller electrically connects label antenna and tag memory cell, and relatively whether reader identification sign indicating number and reader password be identical.When the reader identification sign indicating number was identical with the reader password, label controller sent user's identification code by label antenna.
As a kind of improvement of the present invention, this portable electron device comprises a reader, a recognition memory cell and an identification controller.Reader receives user's identification code and sends the reader identification sign indicating number in order to set up communication with RFID tag.Recognition memory cell is in order to store user's password.Identification controller then electrically connects reader and recognition memory cell, and compares user's identification code and user's password.When user's identification code was identical with user's password, identification controller sent start signal to open the rights of using of portable electron device.
Above-mentioned radio frequency identifying secrete system also comprises a server, in order to provide this user's password to be stored in this recognition memory cell.
In the above-mentioned radio frequency identifying secrete system, this identification controller is an embedded controller or is a South Bridge chip.
In the above-mentioned radio frequency identifying secrete system, this start signal is a startup password, in order to open the rights of using of this portable electron device.
As another kind of improvement the of the present invention, in the above-mentioned radio frequency identifying secrete system, this reader is in order to receive this user's identification code, and when this reader does not receive this user's identification code or this user's identification code and this user's password and when inequality, this identification controller can send a shutdown signal to close the rights of using of this portable electron device.
Another technical matters to be solved by this invention provides a kind of radio-frequency (RF) identification time slot scrambling, but a plurality of different users of keyholed back plate and can avoid user's identification code to be read arbitrarily or duplicate to the rights of using of same portable electron device.
The object of the invention to solve the technical problems also adopts following technical scheme to realize.Again, in order to reach the foregoing invention purpose, according to another preferred embodiment of the present invention, this radio-frequency (RF) identification time slot scrambling is to receive the reader identification sign indicating number that reader sent by RFID tag, and whether compare reader password stored in reader identification sign indicating number and the RFID tag identical.When the reader identification sign indicating number is identical with the reader password, send user's identification code.Then, again by the user's identification code that is disposed at the reader received RF identification label in the portable electron device, and relatively whether user's identification code is identical with user's password.When user's identification code is identical with user's password, check that by this identification controller whether this portable electron device exists a start mark, when this start mark does not exist, opens this portable electron device by this identification controller; When user's identification code and user's password and when inequality, check that by this identification controller whether this portable electron device exists a start mark, when this start mark exists, closes this portable electron device by this identification controller.
In the above-mentioned radio-frequency (RF) identification time slot scrambling, when this user's identification code and this user's password and when inequality, this radio-frequency (RF) identification time slot scrambling also comprises the following step: by the reception number of times of this identification controller record this user's identification code inequality; And when receiving number of times, transmit warning message to a server by this identification controller above a predetermined value.
In the above-mentioned radio-frequency (RF) identification time slot scrambling, when this reader does not receive this user's identification code, close the rights of using of this portable electron device by this identification controller.
Above-mentioned radio-frequency (RF) identification time slot scrambling also comprises following steps: set this user's password, and this user's password is stored in the recognition memory cell of this portable electron device.
Above-mentioned radio-frequency (RF) identification time slot scrambling also comprises following steps: this portable electron device reads this user's password from a server, for comparing with this user's identification code.
The present invention compared with prior art has tangible advantage and beneficial effect.Via as can be known above-mentioned, the invention relates to a kind of radio frequency identifying secrete system, use contactless radio frequency identification mode to control the rights of using of portable electron device, to improve known contact recognition method easy crack, manually to import problem loaded down with trivial details and that discrimination is not good, and but a plurality of different users of keyholed back plate are read arbitrarily or are duplicated to avoid user's identification code the rights of using of same portable electron device.
Description of drawings
For above and other objects of the present invention, feature, advantage and embodiment can be become apparent, accompanying drawing is described in detail as follows:
Fig. 1 is the synoptic diagram that illustrates the present invention's first preferred embodiment;
Fig. 2 is the method flow diagram that illustrates the present invention's first preferred embodiment;
Fig. 3 A is the synoptic diagram that illustrates the RFID tag in the present invention's first preferred embodiment;
Fig. 3 B is the method flow diagram that illustrates the RFID tag in the present invention's first preferred embodiment;
Fig. 4 is the method flow diagram that illustrates the present invention's second preferred embodiment;
Fig. 5 is the synoptic diagram that illustrates the present invention's second preferred embodiment; And
Fig. 6 then is the method flow diagram that illustrates the present invention's second preferred embodiment.
The number in the figure explanation:
100: radio frequency identifying secrete system
110: portable electron device
112: reader
114: identification controller
116: recognition memory cell
120: RFID tag
312: reader
320: RFID tag
322: label antenna
324: label controller
326: tag memory cell
500: radio frequency identifying secrete system
Embodiment
Radio frequency identification (Radio Frequency Identification; RFID), be a kind of contactless automatic identification technology, it is to utilize the automatic recognition objective thing of radiofrequency signal and obtain relevant information, operates quick and conveniently, identification maneuver need not manually get involved, and can discern dynamic object and can discern a plurality of labels simultaneously.Radio frequency identification be one handy, simple and practical and be particularly suitable for the technology of robotization control, it both can be used for the pattern that only reads, also can be used for read-write mode.
The complete radio frequency identification system of one cover is made up of reader (Reader) and identification controller (Transponder) two parts, and wherein identification controller is also referred to as RFID tag (RFIDTag) usually.The operating principle of radio frequency identification system is to launch the radio wave energy of a characteristic frequency to RFID tag by reader earlier, send inner identification code (IDCode) in order to drive RFID tag, or also can initiatively send this identification code by RFID tag.Reader then receives this identification code, delivers to central processing system again and carries out relevant data processing.
The present invention be with reader configuration in portable electron device, control the rights of using of portable electron device by user's identification code of received RF identification label representative, so improve known contact recognition method easy crack, manually import problem loaded down with trivial details and that discrimination is not good.
Fig. 1 is the synoptic diagram that illustrates the present invention's first preferred embodiment.As shown in Figure 1, this radio frequency identifying secrete system 100 comprises a RFID tag 120 and a portable electron device 110.This RFID tag 120 has user's identification code.This portable electron device comprises a reader 112, an identification controller 114 and a recognition memory cell 116.Reader 112 is in order to setting up communication with RFID tag 120, and receives its user's identification code.Recognition memory cell 116 is in order to store user's password.114 of identification controllers electrically connect reader 112 and recognition memory cell 116, and in order to relatively whether user's identification code and user's password identical.When user's identification code was identical with user's password, identification controller 114 sent start signal to open the rights of using of portable electron device 110.
Portable electron device 110 in the present invention's first preferred embodiment for example can be mobile computer, PDA(Personal Digital Assistant), mobile phone, digital camera or other electronic installation that is available for users to carry.And above-mentioned identification controller 114 is except independent configuration, because the inside of portable electron device 110 comprises embedded controller (Embedded Controller usually; EC) or South Bridge chip (Southbridge Chip; SB), therefore also identification controller 114 can be integrated in the built-in embedded controller or South Bridge chip.
And this embedded controller or South Bridge chip usually can be in order to the switching on and shutting down program and the defaults of control portable electron device 110, for example battery settings, setting backlight, power saving setting or play-over etc.Therefore, when portable electron device 110 was in off-mode, above-mentioned start signal can be a startup password at this moment, to open portable electron device 110.Similarly, when portable electron device 110 was in park mode, above-mentioned start signal can be a dormancy return signal or a password at this moment, made portable electron device 110 return back to normal mode of operation from park mode.
In addition, this recognition memory cell 116 for example is erasable EEPROM or other memory subassembly that is suitable for.As a rule, the memory capacity of this recognition memory cell 116 enough stores a plurality of different user's passwords that belong to the different users.Therefore, radio frequency identifying secrete system 100 thus a plurality of different users of keyholed back plate to the rights of using of same portable electron device.Even, after in conjunction with above-mentioned embedded controller or South Bridge chip, those of ordinary skill is to be understood that, start signal in the present invention's first preferred embodiment also can comprise the default instruction, in the rights of using of opening 110 couples of a certain users of this portable electron device, can reset the default of this portable electron device 110 in passing, this portable electron device 110 is adjusted to the state that user at that time is accustomed to most.
Fig. 2 is the method flow diagram that illustrates the present invention's first preferred embodiment, so that radio-frequency (RF) identification time slot scrambling of the present invention to be described.In order more to clearly demonstrate first preferred embodiment, below explanation please refer to Fig. 1 and Fig. 2.Whether this radio-frequency (RF) identification time slot scrambling is by the user's identification code (step 202) that is disposed at the reader 112 received RF identification labels 120 on the portable electron device 110, and relatively user's identification code and user's password identical (step 204).When user's identification code is identical with user's password, open the rights of using (step 206) of portable electron device 110; When user's identification code and user's password and when inequality, close the rights of using (step 208) of portable electron device 110.
In addition, according to first preferred embodiment of the present invention, above-mentioned reader 112 also can be periodically or is received user's identification code randomly.For instance, reader 112 can be periodically or is sent induced signal randomly, makes that all RFID tag 120 in its working range are responded its corresponding user's identification code.Perhaps, if RFID tag 120 is active, then reader 112 can be periodically or is received user's identification code that active radio frequency identification label 120 is sent randomly.When reader 112 does not receive user's identification code (user who for example has RFID tag 120 leaves this portable electron device 110), or user's identification code and user's password and when inequality, identification controller 114 can send a shutdown signal to close the rights of using of portable electron device 110.
Read arbitrarily or duplicate for fear of user's identification code, the present invention also adds a kind of affirmation mechanism in RFID tag, checks earlier whether reader is allowed to receive its user's identification code, to improve the secret ability of radio frequency identifying secrete system of the present invention.
Fig. 3 A is the synoptic diagram that illustrates the RFID tag in the present invention's first preferred embodiment, and Fig. 3 B then is the method flow diagram that illustrates first preferred embodiment, and below explanation please refer to Fig. 3 A and Fig. 3 B.In this preferred embodiment, reader 312 can send a reader identification sign indicating number.RFID tag 320 comprises a label antenna 322, a label controller 324 and a tag memory cell 326.Label antenna 322 is in order to receive reader identification sign indicating number and emission user identification code.326 of tag memory cells can store a reader password and user's identification code.Label controller 324 electrically connects label antenna 322 and tag memory cells 326, and be responsible for relatively the reader identification sign indicating number and the reader password whether identical.
Shown in Fig. 3 B, RFID tag 320 at first receives the reader identification sign indicating number (step 332) that reader 312 is sent by label antenna 322.Whether then, label controller 324 can read the reader password (step 333) that is stored in the tag memory cell 326, more relatively reader identification sign indicating number and reader password identical (step 334).When the reader identification sign indicating number was identical with the reader password, label controller 324 sent user's identification code (step 336) by label antenna 322; When reader identification sign indicating number and reader password and when inequality, do not send user's identification code (step 338).That is to say that RFID tag 320 so can improve the secret ability of radio frequency identifying secrete system of the present invention confirming that reader 312 for after allowing to receive the reader of user's identification code, just can send user's identification code.
Fig. 4 is the method flow diagram that illustrates the present invention's second preferred embodiment.Compare with preferred embodiment shown in Figure 2, this preferred embodiment increases the setting step of user's password and the checking mechanism of start mark.The user sets and stores user's password thus, and can further provide the corresponding action of maintaining secrecy at residing at that time start of portable electron device 110 or off-mode.
In order to clearly demonstrate this preferred embodiment, below explanation please refer to Fig. 1 and Fig. 4.This radio-frequency (RF) identification time slot scrambling is to set user's password earlier, user's identification code of for example specifying a certain RFID tag 120 representatives is as this user's password, and by identification controller 114 with this user's password storage in recognition memory cell 116 (step 401).Afterwards, when this RFID tag 120 during near the portable electron device 110 of configured readers 112, user's identification code (step 402) that this reader 112 can received RF identification labels 120 be sent, and relatively user's identification code and user's password whether identical (step 404).
Then, no matter whether user's identification code is identical with user's password, this preferred embodiment all can be carried out the inspection step of a start mark (flag), to confirm whether portable electron device 110 is in open state (step 406 and 408) at this moment.If the start mark exists, represent that then this portable electron device 110 is in open state; Otherwise,, represent that then this portable electron device 110 is in off-mode if the start mark does not exist.
When user's identification code is identical with user's password, and the start mark then continues to maintain open state (step 416) with this portable electron device 110 when existing.When user's identification code is identical with user's password, and the start mark is then opened this portable electron device 110 (step 426) when not existing.And as mentioned above, this start signal selectively comprises startup password or default instruction, to make things convenient for manipulating of user.
On the other hand, when user's identification code and user's password and inequality, and the start mark is then closed this portable electron device 110 (step 418) when existing.When user's identification code and user's password and inequality, and the start mark then maintains off-mode (step 428) with this portable electron device 110 when not existing.So not only can improve the function of keeping secret of portable electron device 110, and can reach the function of power saving.
Fig. 5 is the synoptic diagram that illustrates the present invention's second preferred embodiment, and Fig. 6 then is the method flow diagram that illustrates second preferred embodiment.Compare with first preferred embodiment shown in Figure 1, this second preferred embodiment is to be provided by server just not use person's password.That is to say this second preferred embodiment uses server to come which user of control to have the rights of using of this portable electron device, therefore be specially adapted to the management of portable electron device in the high security zone, for example the control zone of research and development department etc.
As shown in Figure 5, this radio frequency identifying secrete system 500 except with RFID tag 120 and portable electron device 110 identical shown in first preferred embodiment of Fig. 1, also comprise a server 530.This server 530 is in order to provide the user password, for storing or being temporary in the recognition memory cell 116.Because the user's password in this preferred embodiment is provided by server 530, so system operator of this radio frequency identifying secrete system 500, for example the security information departmental staff of company can or change the rights of using of different users for each portable electron device 110 by server 530 real-time keyholed back plates.
More specifically, this radio-frequency (RF) identification time slot scrambling is to read user's password by server earlier, user's identification code of for example a certain RFID tag 120 representatives, and by identification controller 114 this user's password is stored or is temporarily stored in the recognition memory cell 116 (step 601).Afterwards, when this RFID tag 120 during near the portable electron device 110 of configured readers 112, user's identification code (step 602) that this reader 112 can received RF identification labels 120 be sent, and relatively user's identification code and user's password whether identical (step 604).
Then, no matter whether user's identification code is identical with user's password, this second preferred embodiment all can be carried out the inspection step of a start mark (flag), to confirm whether portable electron device 110 is in open state (step 606 and 608) at this moment.If the start mark exists, represent that then this portable electron device 110 is in open state; Otherwise,, represent that then this portable electron device 110 is in off-mode if the start mark does not exist.
When user's identification code is identical with user's password, and the start mark then continues to maintain open state (step 616) with this portable electron device 110 when existing.When user's identification code is identical with user's password, and the start mark is then opened this portable electron device 110 (step 626) when not existing.And as mentioned above, this start signal selectively comprises startup password or default instruction, to make things convenient for manipulating of user.
On the other hand, when user's identification code and user's password and inequality, and the start mark is then closed this portable electron device 110 (step 618) when existing.When user's identification code and usefulness person password and inequality, and the mark of starting shooting then maintains off-mode (step 628) with this portable electron device 110 when not existing.So not only can improve the function of keeping secret of portable electron device 110, and can reach the function of power saving.
And, if reader 112 receives wrong user's identification code, for example different with user's password user's identification codes then writes down the reception number of times (step 638) of user's identification code inequality, and judges that this receives number of times and whether surpasses a default value (step 648).When receiving number of times above default value, transmit a warning message to server, have the stranger near this portable electron device 110 (step 658) with the system operator of reminding radio frequency identifying secrete system 500, for example other people enter in the control zone of research and development department without approval.The action of this record can promote the secret ability of radio frequency identifying secrete system of the present invention significantly, and the strengthening system supvr is for the control of control zone.
Though the present invention with preferred embodiment openly as above; yet it is not in order to limit the present invention; any those of ordinary skill of haveing the knack of this technology; without departing from the spirit and scope of the present invention; various changes and the retouching done; all should belong within the patent claim of the present invention, so protection scope of the present invention should be looked the scope that claim defines and is as the criterion.

Claims (9)

1. radio frequency identifying secrete system is characterized in that this system comprises:
One RFID tag have user's identification code, and this RFID tag comprises:
One label antenna is in order to receive a reader identification sign indicating number;
One tag memory cell is in order to store a reader password; And
One label controller, electrically connect this label antenna and this tag memory cell, and relatively this reader identification sign indicating number and this reader password, when this reader identification sign indicating number was identical with this reader password, this label controller sent this user's identification code by this label antenna;
One portable electron device, this portable electron device comprises:
One reader in order to set up communication with this RFID tag, receives this user's identification code and sends this reader identification sign indicating number;
One recognition memory cell is in order to store user's password; And
One identification controller, electrically connect this reader and this recognition memory cell, and relatively this user's identification code and this user's password, when this user's identification code was identical with this user's password, this identification controller sent a start signal to open the rights of using of this portable electron device; And
One server is in order to provide this user's password to be stored in this recognition memory cell.
2. radio frequency identifying secrete system as claimed in claim 1 is characterized in that described identification controller is an embedded controller or is a South Bridge chip.
3. radio frequency identifying secrete system as claimed in claim 1 is characterized in that described start signal is a startup password, in order to open the rights of using of this portable electron device.
4. radio frequency identifying secrete system as claimed in claim 1, it is characterized in that described reader is in order to receive this user's identification code, and when this reader does not receive this user's identification code or this user's identification code and this user's password and when inequality, this identification controller can send a shutdown signal to close the rights of using of this portable electron device.
5. radio-frequency (RF) identification time slot scrambling to control the rights of using of a portable electron device, is characterized in that this radio-frequency (RF) identification time slot scrambling comprises the following step by a RFID tag:
A. this RFID tag receives the reader identification sign indicating number that this reader sends, and relatively whether this reader identification sign indicating number is identical with a reader password;
B. when this reader identification sign indicating number is identical with this reader password, send user's identification code;
C. receive this user's identification code by a reader that is disposed on this portable electron device, and relatively whether this user's identification code is identical with user's password;
C1. when this user's identification code is identical with this user's password, check by this identification controller whether this portable electron device exists a start mark;
C11. when this start mark does not exist, open this portable electron device by this identification controller;
C2. when this user's identification code and this user's password and when inequality, check by this identification controller whether this portable electron device exists a start mark; And
C21. when this start mark exists, close this portable electron device by this identification controller.
6. radio-frequency (RF) identification time slot scrambling as claimed in claim 5 is characterized in that among the described step c2, and when this user's identification code and this user's password and when inequality, this radio-frequency (RF) identification time slot scrambling also comprises the following step:
C22. write down the reception number of times of this user's identification code inequality by this identification controller; And
C23. when receiving number of times, transmit warning message to a server by this identification controller above a predetermined value.
7. radio-frequency (RF) identification time slot scrambling as claimed in claim 5 is characterized in that being closed the rights of using of this portable electron device by this identification controller when this reader does not receive this user's identification code.
8. radio-frequency (RF) identification time slot scrambling as claimed in claim 5 is characterized in that before the described step a, and this radio-frequency (RF) identification time slot scrambling also comprises following steps:
A1. set this user's password, and this user's password is stored in the recognition memory cell of this portable electron device.
9. radio-frequency (RF) identification time slot scrambling as claimed in claim 5 is characterized in that before the described step a, and this radio-frequency (RF) identification time slot scrambling also comprises following steps:
A2. this portable electron device reads this user's password from a server, for comparing with this user's identification code.
CNB2005100687289A 2005-04-30 2005-04-30 Radio frequency identifying secrete system and method Expired - Fee Related CN100412880C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100687289A CN100412880C (en) 2005-04-30 2005-04-30 Radio frequency identifying secrete system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100687289A CN100412880C (en) 2005-04-30 2005-04-30 Radio frequency identifying secrete system and method

Publications (2)

Publication Number Publication Date
CN1858771A CN1858771A (en) 2006-11-08
CN100412880C true CN100412880C (en) 2008-08-20

Family

ID=37297679

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100687289A Expired - Fee Related CN100412880C (en) 2005-04-30 2005-04-30 Radio frequency identifying secrete system and method

Country Status (1)

Country Link
CN (1) CN100412880C (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101551847B (en) * 2009-04-30 2011-09-28 张利峰 Radio-frequency wireless input method
CN102202294A (en) * 2010-03-23 2011-09-28 纬创资通股份有限公司 Data encryption method and wireless communication system
WO2011143805A1 (en) * 2010-05-17 2011-11-24 云文平 Device connecting portable storage media for non-built-in data security
CN103295039B (en) * 2013-06-17 2015-10-28 上海众人网络安全技术有限公司 Radio frequency card read-write operation method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604115A (en) * 2003-09-29 2005-04-06 三洋电机株式会社 System for preventing imitation articles

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604115A (en) * 2003-09-29 2005-04-06 三洋电机株式会社 System for preventing imitation articles

Also Published As

Publication number Publication date
CN1858771A (en) 2006-11-08

Similar Documents

Publication Publication Date Title
US7382225B2 (en) Radio frequency identification security system and method
US20070221725A1 (en) Reader/Writer Secure Module Access Control Method
US9244862B2 (en) Secure storage device permanently disabled by remote command
TWI331304B (en) Radio frequency identification security system and method
US20140347170A1 (en) Method and Terminal for Managing Radio Frequency Identification Card
US20080005580A1 (en) Electronic data storage medium with fingerprint verification capability
CA2529176A1 (en) Method and system for creating and operating biometrically enabled multi-purpose credential management devices
CN102103765A (en) Access control and information display system, method and terminal
WO2003003194A1 (en) Integrated circuit device, information processing device, information recording device memory management method, mobile terminal device, semiconductor integrated circuit device, and communication method using mobile terminal device
KR100690296B1 (en) Appratus and method for changing data of rfid tag in handheld terminal
CN101782951A (en) Hard disc remote destroying antitheft system and method
CN100412880C (en) Radio frequency identifying secrete system and method
CN112508554B (en) Transaction processing method and device based on near field communication
CN103927803B (en) Based on the Electrically operated gate lock control system of active radio frequency identification
WO2009020264A1 (en) Mobile terminal power up by external device
JP4599081B2 (en) Memory card adapter and memory card
CN100487717C (en) Method and system of RF identifying safety
KR100761252B1 (en) Selection Device of RF Antenna in Mobile Telecommunication Terminal
CN210515421U (en) Intelligent access control system based on Internet of things
CN100555302C (en) Data read-write equipment and method based on radio frequency identification system
Hemalatha et al. RFID, password and OTP based door lock system using 8051 microcontroller
CN212009608U (en) Equipment running state monitoring system
CN202433911U (en) RFID (radio frequency identification) device for portable intelligent device
KR20100084303A (en) System and method for power control of user terminal using data transmission of radio frequency identification
JP2001312711A (en) Method and system for preventing illegal utilization of card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080820

Termination date: 20170430

CF01 Termination of patent right due to non-payment of annual fee