CN107273774A - Electronic tag and processing system and method for ensuring electronic tag - Google Patents
Electronic tag and processing system and method for ensuring electronic tag Download PDFInfo
- Publication number
- CN107273774A CN107273774A CN201710437735.4A CN201710437735A CN107273774A CN 107273774 A CN107273774 A CN 107273774A CN 201710437735 A CN201710437735 A CN 201710437735A CN 107273774 A CN107273774 A CN 107273774A
- Authority
- CN
- China
- Prior art keywords
- information
- information table
- password
- project
- function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012545 processing Methods 0.000 title claims abstract description 240
- 238000000034 method Methods 0.000 title claims abstract description 125
- 230000015654 memory Effects 0.000 claims abstract description 227
- 230000006870 function Effects 0.000 claims description 196
- 230000005764 inhibitory process Effects 0.000 claims description 86
- 238000004891 communication Methods 0.000 claims description 74
- 230000006378 damage Effects 0.000 claims description 21
- 238000004519 manufacturing process Methods 0.000 claims description 12
- 238000005259 measurement Methods 0.000 claims description 12
- 230000005611 electricity Effects 0.000 claims description 10
- 238000004364 calculation method Methods 0.000 claims description 9
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 description 38
- 238000012546 transfer Methods 0.000 description 28
- 238000010586 diagram Methods 0.000 description 27
- 238000012360 testing method Methods 0.000 description 23
- 238000003860 storage Methods 0.000 description 20
- 230000007246 mechanism Effects 0.000 description 17
- 238000012795 verification Methods 0.000 description 15
- 230000008859 change Effects 0.000 description 14
- 230000033228 biological regulation Effects 0.000 description 11
- 239000010931 gold Substances 0.000 description 11
- 229910052737 gold Inorganic materials 0.000 description 11
- 230000008569 process Effects 0.000 description 11
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 8
- 238000003780 insertion Methods 0.000 description 7
- 230000037431 insertion Effects 0.000 description 7
- 230000000873 masking effect Effects 0.000 description 7
- 239000004033 plastic Substances 0.000 description 7
- 229920003023 plastic Polymers 0.000 description 7
- 238000007689 inspection Methods 0.000 description 6
- 230000032258 transport Effects 0.000 description 6
- 238000006243 chemical reaction Methods 0.000 description 5
- 230000006698 induction Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000003936 working memory Effects 0.000 description 5
- UFULAYFCSOUIOV-UHFFFAOYSA-N cysteamine Chemical compound NCCS UFULAYFCSOUIOV-UHFFFAOYSA-N 0.000 description 4
- 239000000463 material Substances 0.000 description 4
- 238000005096 rolling process Methods 0.000 description 4
- 230000009897 systematic effect Effects 0.000 description 3
- 244000144730 Amygdalus persica Species 0.000 description 2
- 244000068988 Glycine max Species 0.000 description 2
- 235000010469 Glycine max Nutrition 0.000 description 2
- 235000006040 Prunus persica var persica Nutrition 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 235000013339 cereals Nutrition 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 239000003651 drinking water Substances 0.000 description 2
- 235000020188 drinking water Nutrition 0.000 description 2
- 238000005538 encapsulation Methods 0.000 description 2
- 238000007667 floating Methods 0.000 description 2
- 230000014759 maintenance of location Effects 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 239000007858 starting material Substances 0.000 description 2
- 238000005728 strengthening Methods 0.000 description 2
- 240000008790 Musa x paradisiaca Species 0.000 description 1
- 235000018290 Musa x paradisiaca Nutrition 0.000 description 1
- 240000007594 Oryza sativa Species 0.000 description 1
- 235000007164 Oryza sativa Nutrition 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 239000000853 adhesive Substances 0.000 description 1
- 230000001070 adhesive effect Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 235000013361 beverage Nutrition 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 229940079593 drug Drugs 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 239000012530 fluid Substances 0.000 description 1
- 235000013305 food Nutrition 0.000 description 1
- 235000021022 fresh fruits Nutrition 0.000 description 1
- 150000002343 gold Chemical class 0.000 description 1
- 238000009413 insulation Methods 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 239000010985 leather Substances 0.000 description 1
- 239000007788 liquid Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 229910052751 metal Inorganic materials 0.000 description 1
- 239000012811 non-conductive material Substances 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 238000004382 potting Methods 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000008521 reorganization Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 235000009566 rice Nutrition 0.000 description 1
- 230000009885 systemic effect Effects 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10257—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07749—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10366—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07749—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
- G06K19/07758—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- Microelectronics & Electronic Packaging (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Electromagnetism (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Finance (AREA)
- Power Engineering (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present disclosure relates to an electronic tag and a processing system and method for securing the electronic tag. A method for an RFID-tagged item processing system to authenticate an electronic tag, the electronic tag including a tag identifier and a tag memory, the method comprising: and establishing an item information table containing a first information table and a second information table on the electronic tag, wherein the second information table contains second authentication information, a short message receiving number and second other information. And selecting and checking the electronic tags. The read first information table includes a first encryption key and an item expiration date. The number of blocks of the first information table and the item deadline are checked. Reading the tag identifier includes a tag serial number. The first encryption key is decrypted to obtain the second sub-information. And checking the second sub-information to authenticate the authenticity of the electronic label. The second information table is read. The second information table with the original arrangement is obtained through an inverse adjustment operation. Authenticating the second authentication information to use the second other information and transmitting the short message to the received short message number.
Description
The application is entitled " method and its device and system that are used in electronic tag " submitted on December 26th, 2013
Chinese patent application NO.201310728850.9 divisional application.
Technical field
The application be on it is a kind of for RFID tag Item Processing System be used in electronic tag method and using should
The device and system of method, especially with regard to a kind of in the item for having coding parameter in electronic tag according to the foundation of plural authentication phase
Mesh information table, using decryption encryption key and authentication password, adjusting parameter sequentially, or more combine with the electronic tag of certification one
For RFID tag Item Processing System plural authentication method and using this method device and system.
Background technology
Radio frequency identification (Radio Frequency Identification, RFID) system generally comprises RFID electronics
Label, RFID reader and the component such as computer (Computer) or controller (Controller).The electronic tag is included
One insert (inlay), the insert includes an integrated circuit (IC) and an antenna, and such as integrated circuit function meets ISO
The communication interface such as 18000-6C/EPC C1GEN2, ISO 18000-3M3 or ISO 18000-3 provides that the antenna is via special
Encapsulation technology is placed in the electronic tag, the reader can according to it is defined instruction with the electronic tag carry out communication session and
Access data.The electronic tag includes a label identifier, is made up of manufacturer's numbering and unique label sequence number,
And include the memory headroom of a storage data.The processing routine of the computer will be first set between the electronic tag and the reader
Communication modes, it include communication channel, conference number (Session Number), pulsewidth, link frequency, changing mode
(Modulation), position transmission speed and antenna transmission power etc., when the electronic tag enters the read range of the reader
When interior, the reader could access the data in the electronic tag.
The ATM (ATM) of more than 140 ten thousand although bank establishes in a wide range in the whole world already, to provide user the gold of 24 hours
Melt service, but there is thousands of customers up to a hundred or user to go processes financial business to various regions bank daily, except that must withdraw deposit
Or filled in person on deposit or account transfer document, or be asked before bank cashier, seem deposit/drawings account number, deposit/drawings account number family
Outside name and drawing or deposit or transfer amount, it is also required to provide seal, certificate with discriminating user identity, and input
One group of password is compared for bank computer system, and cash can be got after identity identification and password are compared successfully, these
Authentication mode is extremely inconvenient for the blunt elder of user's especially knowledge, it is therefore desirable for there is certain electronic tag to store user
Information needed for processes financial business, and have certain authentication method to examine the electronic tag true and false and ensure system safety, use
The electronic tag can replace the foregoing shortcoming manually filled in.
Current RFID is in the application of high frequency, and fiscard or credit card are combined with cash card consumption, and are widely used
In daily life, bus, railway, high ferro, the paying gone sightseeing or done shopping for example are taken, but in parking lot or height
Charge station's payment of fast highway, still common vehicle stops is charged by fee-collector, it is therefore desirable for having certain new card and system, no
Only in conjunction with RFID superfrequency long range technologies and cash debit facility, on vehicle, vehicle is allowed to pay under steam with generation
For the manpower needed for charge, and it is equally applicable to existing RFID high frequencies short-range applications.
Because electronic tag is in addition to the application in financial circles, the still application comprising other industries, seem asset management,
Gate inhibition, cash consumption, product resume management, Hospital Drugs and nurse management and project level tracking etc., if certain examines electricity
The method of the subtab true and false can be applied in financial circles, then as long as electronic tag is encoded according to category of industry, then this is new
Method equally just may be used on other industries, therefore be also contemplated that electronic tag can be encoded according to category of industry, and the new method is just
Multi industries can be used for simultaneously, such as certain of the industry with reference to finance, cash card consumption and gate inhibition (Gate Access)
Device, so that it may used on new ATM, in convenience store shopping, it is also possible to start the electric equipment in control gate inhibition area.
Mentioned in the patent document of U.S. Patent number 6,130,623 electronic tag, reader and between exchange information
Technology, communicated between electronic tag and reader through antenna in RFID modes, the personal information (example in electronic tag
Such as the PIN code in mobile phone) be easily intercepted and be stolen, such as using the reader of personation come the individual in reading electronic labels
Information.Another situation is to be communicated using the electronic tag of personation with reader, and application processor is then stolen again and is stored up
The secret data deposited.Therefore to solve the problem of private file leaks, the patent document proposes the encryption to private file
Method.But for protection secret data and ensure that system still expects there is more effective way safely.
In IEEE " a low cost UHF RFID Tag Baseband with an IDEA Cryptography
In Engine " paper, the method that IDEA (IDEA) is encrypted is applied to adding for the data in electronic tag
It is close, but its used crypto engine needs to increase integrated circuit between reader and electronic tag, such way is not only
The computing of complexity is needed, and adds the cost of system.
The content of the invention
In view of shortcoming and the expectation of prior art, the present invention propose the method for improving and solving above-mentioned condition, using RFID
Technology and combining that encryption and decryption key, coding, transmission news in brief and adjusting parameter put in order, build according to plural authentication phase
A vertical new RFID and its device and a RFID tag Item Processing System are utilized in the method for certification electronic tag
The systemic-function of the present invention is applied to multi industries by coding, and transmission news in brief are used as a kind of safe method of Verification System.Whenever
When one local computer provides that instruction carries out communication session through a RFID reader and an electronic tag according to communication interface, generally
It is that instruction and data are transmitted with frame (Frame), and frame can include timestamp, instruction encoding and parameter, protocol integrated test system
(Protocol Control, PC) information, unique items identifier (Unique Item Identifier, UII) and CRC
The information such as error detecting code.If the UII be for comprising multipurpose and multi-functional Project Authorization information, seem deposit/drawings account number,
Deposit/drawings password, credit card number, face the close code ﹙ of cabinet clothes business and referred to as face the close code ﹚ of cabinet, credit clip pin, compare the frequency of failure, cash
Card balance amount information and encryption key etc., then these information will have the block count from 10 to 44 not grades, in different electricity
In subtab, it is not required to arrange according to permanent order again between some information, then someone wants to steal from the frame data are eavesdropped
Indivedual encrypted messages are taken to be nearly impossible, if because the frame is equal between parameter comprising multigroup parameter information
Protection mechanism is enclosed, so the communication link between RFID reader and electronic tag becomes safer, it is necessary on the contrary
The place for strengthening protection and anti-eavesdrop is in terms of the electronic tag true and false is examined.
Again in view of bank is come to current user handles the operator that deposit, drawing or ta vservice have to fill out document
Formula will do simplification, and the application proposes a kind of method for setting up a Project Information Table for radio frequency identification processing system, the party
Method is that have to set up a Project Information Table in the RFID of internal memory at one for user, and the Project Information Table is stored in this
Internal memory, the Project Information Table comprising user deposit/drawings account number, face the parameters such as cabinet password and encryption key.When user comes
During bank, as long as the electronic tag is placed in the RFID reader of a bank cashier, it is not necessary to fill in deposit or withdraw deposit or transfer accounts
Document, the bank cashier in performing a RFID tag Item Processing System program on its local computer, is read through the RFID immediately
Take device to read the Project Information Table in the electronic tag, deposit/drawings account of the bank cashier in using the Project Information Table
It before information, can first require that user produces one's papers for recognizing its identity, and when withdrawing deposit, also can first require user through numerical key
Disk input one faces cabinet password for comparison.After authentication password success, just proceed follow-up operation procedure, it includes will
Cash is dumped in the electronic tag.When the Project Information Table is comprising seeming deposit/drawings password or credit clip pin, the electronics
Label can be used on a new ATM.Again when the Project Information Table comprising seem cash card remaining sum, cash card shop classification,
During the cash card balance amount informations such as cash card goods number, cash card use state, cash card boarding station numbering, so that it may in shop pair
The cash card remaining sum of the electronic tag is withholdd or Stored Value.The electronic tag also can be with a superfrequency long range communication antenna knot
Conjunction is fabricated to certain device, and in being set up in the electronic tag just like above-mentioned Project Information Table, such as with reference to fiscard card number
(or deposit/drawings account number) and cash card or combination credit card number and the function of cash card, then hang the electronic tag from above
In vehicle or it is placed in the insertion groove being attached on vehicle, makes that the electronic tag faces vehicle heading and be fixed on can
Make left rotation and right rotation or the insertion groove that adjusts upward in, the vehicle can be withholdd with cash under steam in highway or parking lot
Mode is paid.When it seems to allow cash card remaining sum to have selection to store certain currency function that the Project Information Table, which is combined, user can
Bought foreign currency is stored using the electronic tag in bank, if the selection store certain currency function also can be in other country
Shop is used, when user is in consumption, if currency used in family's shop selection spending amount, is held with being stored in the user
The kind of currencies of electronic tag is different, then as long as obtaining currency exchange rate to financial center's database through network on-line,
The spending amount of user can be exchanged into has identical kind of currencies with cash card remaining sum, to carry out the certification of the electronic tag
And cash is withholdd or Stored Value, the electronic tag can be taken as cash to use in the whole world.
Because the Project Information Table includes multipurpose and multi-functional project information, therefore it is necessary to strengthen to the electronic tag
The certification of the true and false, therefore the application proposes the plural authentication method for a RFID tag Item Processing System, it recognizes comprising one
Demonstrate,prove the electronic tag true and false and confirm that the method for belonging to identical systems faces the method for cabinet password with a certification user.The certification electronics
The method of the label true and false, which is included in the electronic tag, to be set up one and has the Project Information Table of coding parameter, in the Project Information Table
A project code, a bullets, a Customs Assigned Number and an encryption key are added, the encryption key and the Customs Assigned Number are
The true and false for the certification electronic tag and confirm to belong to identical systems, the processing system is selected according to the project code of the electronic tag
Power taking subtab, can both increase the efficiency of the processing system, and prevented also from sundry item information in being leaked before certification, decryption is encrypted
Key can recognize the true and false of the electronic tag and confirm to belong to identical systems.In addition, in order to increase to the Project Information Table
Anti-eavesdrop mechanism, the plural authentication method further proposes the project information that will be stored in the electronic tag memory headroom
Table is distinguished into the first memory block information table, the second memory block information table and the 3rd memory block information according to plural authentication phase
Table, and the first memory block information table only includes the project information needed for the first authentication phase, such as project code, project are compiled
Number, Customs Assigned Number and encryption key, wherein the encryption key by the label sequence number, the Customs Assigned Number and this in second
Deposit the generation of block information table length value, the Customs Assigned Number is to start number in order since 1 or a system designator code is digital, and other
The project information used in the second authentication phase seems deposit/drawings account number, deposit/drawings password, faced more than cabinet password and cash card
Volume information is then stored in the second memory block information table, decrypts encryption key to obtain the second memory block information table length
Value, and examine the second memory block information table length value just to read second memory field to confirm to belong to identical systems, then
Block information table, other still have needed for project information used after the second authentication phase certification success, such as processing system
User's account transfer account number, then be stored in the 3rd memory block information table, this be all increase to the secrecy of the Project Information Table and
Anti-eavesdrop mechanism.And the plural authentication method is the another link key for adding an encryption in the second memory block information table,
And the link key packet contains one the 3rd memory block information table length value, decryption links key, and obtains the 3rd memory block
Information table length value is to read the 3rd memory block information table, the second memory block information table in Different Industries and system
It may be selected to be added without the link key of an encryption, but add one and receive news in brief number, believe using the project of the electronic tag
When ceasing end of list (EOL), the news in brief of exchange hour, place and transaction summarization composition can be sent to the reception news in brief by the processing system
Number, has also given user another mode confirmed using the electronic tag.Due to never transmitting single in each authentication phase
Encrypted message, so the plural authentication method provides a kind of false proof, anti-eavesdrop and the most cost-efficient communication side of safety
Formula.
When bank cashier performs RFID tag Item Processing System program via reader according to selection instruction selection electronics
The project code of label, so that during Project Information Table, electronic tag only can be by its first memory block information in reading electronic labels
Table passes the processing system back, and the first memory block information table is the first internal memory comprising project code, Customs Assigned Number, encryption key etc.
Block authentication information, and comprising bullets, the PC information for having initial value, CRC16 error detecting codes etc. be the first memory block other
Information.And the method for the certification electronic tag true and false includes decryption encryption key, the processing system is according to the certification electronics
After the method for the label true and false reads the label identifier of the electronic tag through reader, you can the true and false of the certification electronic tag and
Confirmation belongs to identical systems, and obtains the second memory block information table length value i.e. block count in electronic tag, to complete first
The certification in stage.And the method that certification user faces cabinet password first requires that user inputs one with numeric keypad including the processing system
Authentication password, the processing system reads the second internal memory in the electronic tag after successful decryption encryption key through reader
Block information table, it is the second memory block authentication information that it, which includes deposit/drawings account number, faces cabinet password, link key of encryption etc.,
And comprising deposit/drawings password, compare the frequency of failure, cash card balance amount information be the second memory block other information, the processing system
Whether the authentication password that comparison user has first inputted is consistent with the cabinet password that faces read from electronic tag, is comparing password success
Afterwards, the processing system just can set up online through network and banking data base, using the deposit/drawings account number as index, obtain the user
Data are simultaneously shown on display, the customer identification symbol of such as user, name in an account book, the birthday, address, telephone number, e-mail,
And the information such as occupation, following bank cashier can compare identification documents that user first shown whether with the display institute
Display data is consistent.After user identity identification certification success, this just completes the certification of second stage, following bank cashier
The deposit/drawings account number just can be used to carry out follow-up operation procedure, therefore user is just not necessary to fill in and withdrawn deposit or deposit or the list of account transfer
According to.If user is traded using a new ATM, the plural authentication method also includes selecting a certification classification simultaneously by user
An authentication password is inputted, the processing system chooses one group of password from the second memory block authentication information as authentication information, so
The authentication password of the input and the authentication information of the selection are compared afterwards, after password success is compared, the just link of decryption encryption
Key, and the 3rd memory block information table length value i.e. block count is obtained, and when user selects to transfer accounts, the processing system is just
It can be read through the reader and be stored in the 3rd memory block information table in the electronic tag, it includes the account transfer account of user preset
Number, and the account transfer account number is shown on display, so that user selects and is traded.
When user uses a new ATM, the tagged items processing system is divided into deposit/drawings, transaction with credit and cash
Stored Value is merchandised, if deposit/drawings are merchandised, then user inputs its deposit/drawings password through numeric keypad, if transaction with credit, then user
Its credit clip pin is inputted, if cash Stored Value is merchandised, then user inputs its cash clip pin.Again when user is carrying out cash card
Consumption or during Stored Value, although need not compare authentication information according to current cash card consumption pattern, but in order to prevent cash card or
High amount CASH ADVANCE credit card is once lose or stolen and robber's brush, the plural authentication method carried according to the application, and it is only
The cabinet password that faces of the memory block of electronic tag second is used as cash clip pin or in second memory block addition one
Cash clip pin, and one cash clip pin of input is required by the tagged items processing system, it is necessary to recognize by cash clip pin
After card, side carries out cash card and withholdd transaction, is so prevented from that financial card is stolen and robber brushes.
In addition, the method for the certification electronic tag true and false can be applied to many other industries, in addition to financial circles, still should
For seeming the industries such as asset management, gate inhibition, cash consumption, transnational production record management, transnational product tracking and managing.Therefore originally
As long as application propose by industry, enable function, device, function and implement the class declaration such as country in a parameter seem project
In coding, then the project code is stored in the Project Information Table of electronic tag, then for the electronic tag of financial circles certification one
The method of the true and false, equally can just be combined with other industries, or be applied to industry even transnational beyond financial circles.Example
Comparison authentication information such as is set up in a RFID asset management systems, and after authentication information success is compared, entrance could be obtained
The authority that the asset management system is inquired about and modification assets are noted down.Such asset management system is choosing electronics mark through reader
During label, so that it may choose electronic tag according to project code, the asset management system can also become more efficiently, it is therefore desirable for electronics
Label can have industry, enable function, device, function and the project code for implementing the classifications such as country coding, whole to improve
The application of the treatment effeciency and extension certification of RFID Item Processing Systems the electronic tag true and false method.In another example one
In RFID gate inhibition's control system, the Project Information Table of an electronic tag is set up comprising seeming that a RFID passes through control card, the RFID
Each mandate that can all correspond to a control gate inhibition area in current control card is passed through and used, and control gate inhibition area includes setting
Fenced in checkpost or parking lot, the Office Area or building or fitness center locked a door provided with electronics and provided with electric rolling door
House or cell or building, when using the electronic tag, with the control gate inhibition Qu Shi that passes through, relatively safe method is first to recognize
The true and false of electronic tag is demonstrate,proved, the setting of one for then examining control gate inhibition area to correspond in the current control cards of the RFID, if
The position is set as that 1 representative has authorized current and entered the area, so that it may start the electric equipment in control gate inhibition area, it includes opening
Dynamic Railings machine, rolling door, warning lamp, siren, electronic lock, illuminator, control gate inhibition's message display and other electrical equipment
Equipment, if the position is set as 0 to represent unauthorized current and enter the area, so that it may which the alarm electric equipment for starting control gate inhibition area is set
Standby, it includes starting warning lamp, siren or transmission alert news, but when setting up the control gate control system of a safety, no matter inspection
Test the electronic tag result how, it is necessary to record every time examine electronic tag, transmission one gate inhibition's news in brief or Email extremely
Reception news in brief number in the Project Information Table can also provide the ability of another strengthening system safety.
According to above-mentioned conception, the application proposes to set up in an electronic tag internal memory for a RFID tag Item Processing System
The method of one Project Information Table, the electronic tag has label identifier (Tag Identifier, TID), reserved memory
(Reserved Memory, RM) space, unique items identifier (Unique Item Identifier, UII) space and
User memory (User Memory, UM) space, the label identifier comprising a label sequence number (Tag Serial Number,
TagSN) and manufacturer numbering (Manufacturing Identifier), and the method for setting up the Project Information Table is included
Set up project in the RM spaces and destroy password and project and access to your password, also comprising the UII spaces are divided into the first memory block letter
Table and the second memory block information table are ceased, the UM spaces can be the 3rd memory block information table, and in first memory block letter
Cease to set up in table and include the first authentication information, one first encryption key and the first other information, wherein first authentication information
Comprising project code and Customs Assigned Number, the Customs Assigned Number is a system constant value or system designator code numeral, this first other
Packet contains bullets and the first PC information, and the first PC information is provided with an initial value.Again in the second memory block information
Set up in table and include the second authentication information and the second other information, wherein second authentication information includes deposit/drawings password, credit
Clip pin, face cabinet service password and cash card remaining sum, second other information comprising deposit/drawings account number, compare the frequency of failure,
Cash card remaining sum currency, cash card shop coding, cash card goods number, cash card use state and cash card boarding station are compiled
Number.Set up again in the 3rd memory block information table and include the 3rd information table, wherein the 3rd information table includes an account transfer account
Number table or a RFID pass through control card or one receive news in brief directory, or more combination.
According to above-mentioned conception, on the other hand the application proposes a RFID tag Item Processing System in the electronic tag of certification one
When using a plural certification method, the electronic tag has a label identifier and a tag memory, and the tag memory is according to interior
Deposit section and block to distinguish, including divide into reserved memory block, unique items identifier memory block, the first memory field
Block, the second memory block and the 3rd memory block, and save project destroys password in the reserved memory block and project is deposited
Password is taken, first information table is stored in first memory block, the second information table is stored in second memory block, at this
The 3rd information table is stored in 3rd memory block, the plural authentication method is comprised the steps of:According to the project code of electronic tag
Choose and check the electronic tag.A first information table is read, the first information table is close comprising the first authentication information, the first encryption
Key and the first other information, wherein first authentication information include project code and Customs Assigned Number, the first other information bag
Containing bullets, the first PC information, wherein the first PC information indicate first information table length value be block count, and this first plus
Close key packet is containing the second encrypted sub-information, and second sub-information is the second information table length value.It is required that user provides status
Recognize certificate.It is required that user inputs an authentication password in numeric keypad.Read the label identifier.Decrypt the first encryption key with
Obtain second sub-information.Second sub-information is examined to verify that the electronic tag Makoto is pseudo- and belongs to identical systems.Read the
Two information tables, second information table includes the second authentication information, the second encryption key and the second other information, wherein this
Two authentication informations include deposit/drawings password, face cabinet password and compare the frequency of failure, and second other information includes deposit/drawings
Account number and cash card balance amount information, the cash card balance amount information are used comprising cash card remaining sum currency, cash card remaining sum, cash card
State and cash card boarding station numbering.User's status is distinguished, the deposit/drawings account number can be used certainly in the tagged items processing system
Database obtains a user authentication information, customer identification symbol of the user authentication information including user, name in an account book, birthday, phone number
Code, e-mail and address, for comparing user's status.Compare the authentication password and the authentication information.Status identification and
The operation procedure that deposit/drawings account number is withdrawn deposit or deposited just can be used in password after comparing successfully.Decrypt the second encryption key with
Obtain the 3rd information table length value i.e. block count.According to the 3rd information table block count, to read the 3rd information table, wherein should
3rd information table comprising an account transfer account number table, a RFID pass through control card, one receive news in brief directory, or more combination.Should
The deposit/drawings account number and the account transfer account number table can be used to be withdrawn deposit and transferred accounts for tagged items processing system, or according to the cash
Card remaining sum currency by drawing unloading is in the cash card remaining sum of the electronic tag and records the transaction, also can by the exchange hour,
The news in brief of point and transaction summarization composition are sent to a reception news in brief number.
Brief description of the drawings
The present invention can be understood in more detail from following description, these description be provide by way of example and can
It is understood with combining institute's accompanying drawings, wherein:
Fig. 1:The schematic diagram of the application the first preferred embodiment radio frequency identification information system 1;
Fig. 2:The schematic diagram of electronic tag 3 of the preferred embodiment of the application second;
Fig. 3:The preferred embodiment of the application the 3rd is in a financial credit cash certification card (not shown) according to tag memory address
Set up the parameter configuration schematic diagram of a Project Information Table 33;
Fig. 4:The preferred embodiment of the application the 3rd is in a financial credit cash certification card (not shown) in its electronic tag
30 user memory block 3E set up the 3rd information table 3E0 schematic diagram;
Fig. 5:The application encrypts the schematic diagram with the first encryption key 352 of decryption;
Fig. 6:The application encrypts the schematic diagram with the second encryption key 370 of decryption;
Fig. 7:The application sets up project and destroys password 3B1 and project and accesses to your password 3B2 method in reserved memory block 3B
Schematic diagram;
Fig. 8:The application sets up the second information table 39 in UII memory blocks makes it have the different method signals put in order
Figure;
Fig. 9:It is user that the application is used for a radio frequency identification information system in a RFID tag Item Processing System 22
The method schematic diagram of a Project Information Table 33 is set up in an electronic tag 3;
Figure 10:The preferred embodiment RFID tag Item Processing System of the application the 4th is used for a radio frequency identification information system
System is using encryption key and password with the method schematic diagram of the electronic tag 3 of certification one;
Figure 11:The preferred embodiment RFID tag Item Processing System of the application the 5th uses a plural rank of authentication method first
The message of section changes over time schematic diagram;
Figure 12:The application RFID tag Item Processing System is using the message of a plural authentication method second stage with the time
Change schematic diagram;
Figure 13:The preferred embodiment RFID tag Item Processing System 22 of the application the 6th uses a plural number in toll is paid
The message of authentication method changes over time schematic diagram;And
Figure 14:The preferred embodiment RFID tag Item Processing System 22 of the application the 7th is used for a radio frequency identification information
The schematic diagram of system.
Embodiment
It refer to the accompanying drawing of the present invention to read following detailed description, wherein the accompanying drawing of the present invention is with illustration
Mode, to introduce a variety of embodiments of the invention, and for learning how to realize the present invention.The embodiments of the invention provide fill
The content of foot, implements disclosed embodiment for those skilled in the art, or implement according to disclosed
Content derived from embodiment.On the explanation of specific embodiment, ask those skilled in the art with reference to following content explanation with
And can be appreciated that present invention after schema.
Referring to Fig. 1, it is the schematic diagram of the application radio frequency identification information system 1.The radio frequency identification information
System 1 includes a radio frequency identification Verification System 2, an electronic tag 3, a network connection device 5, an internet 6, Yi Jiyi
Wireless mobile network equipment 7, the radio frequency identification Verification System 2 includes a RFID tag Item Processing System (RFID Tag
Item Processing System, RFID TIPS) 22, one network connections 21, one other networks of processing system 24 and one
Link 23, the wireless mobile network equipment 7 comprising one using wireless mobile network system running gear, for example using GSM,
GPRS certification mobile phone or display, or receive through internet news in brief, image or one of news in brief and image and have the aobvious of IP address
Show device or receive the running gear of news in brief number, this action device includes intelligent certification mobile phone, display or server.Electricity
Subtab 3 is that the device for having a Project Information Table is set up among its tag memory.In one embodiment, the energy of electronic tag 3
Communication and transinformation are set up according to ISO 18000-6C communication interfaces regulation and a reader.The electronic tag 3 has a label
The tag memory 34 of identifier 31 and one, the tag memory 34 can be distinguished according to memory sections and block, and it includes the first memory field
Block 36, the second memory block 38, the 3rd memory block 3G and reserved memory block 3B, second memory block 38 can be included
First memory block 36, and the 3rd memory block 3G can be a user memory block 3E.Electronic tag 3 further includes an interface
And communication control circuit 3K, an antenna 3J, antenna 3J is connected to the interface and communication control circuit 3K, and the interface and communication
Control circuit 3K connects the tag memory 34, and the electronic tag 3 can be by the electronic tag internal memory 34, the interface and communication control
Circuit 3K and the antenna 3J processed is fabricated to one and pastes label apparatus, or it and insulative potting material are fabricated with into a thickness
Card or other shapes device.Antenna 3J can be UHF-antenna to launch and receive superfrequency signal, and the interface
And superfrequency signal is converted at label by communication control circuit 3K according to frame mode as defined in superfrequency RFID communication interfaces
Reason instruction, for example, choose (Select) electronic tag, examination (Query) electronic tag, access (Access) electronic tag, examination
Report (QueryRep), the random code that to look for novelty (Req_RN), reading (Read) tag memory, deposit (Write) tag memory etc.
Deng.In a preferred embodiment, antenna 3J can be radio-frequency induction coil to transmit and receive high-frequency signals, and the interface and
Communication control circuit 3K can change the high-frequency signals according to frame mode as defined in ISO 18000-3M3 high-frequency RF ID communication interfaces
Into tag processes instruction, for example, choose (Select) electronic tag, examination (BeginRound) electronic tag, access (Access)
Electronic tag, examination report (NextSlot), the random code that to look for novelty (Req_RN), reading (Read) tag memory, deposit
(Write) tag memory etc..Again in a preferred embodiment, antenna 3J can have one group of UHF-antenna simultaneously and one group high
Frequency induction coil is to launch and receive superfrequency signal, or transmission and reception high-frequency signals, and the interface and Communication Control are electric
Road 3K may be selected that the superfrequency signal is converted into tag processes instruction according to frame mode as defined in superfrequency RFID communication interfaces,
Or according to frame mode as defined in high-frequency RF ID communication interfaces by the high-frequency signals be converted into tag processes instruction.The tag memory 34
Save project information table 33, the Project Information Table 33 includes first information table 35, the second information table 37 and the 3rd information table
3E0.First memory block 36 storage first information table 35, the first information table 35 adds comprising the first authentication information 350, first
The other information 354 of key 352 and first.Second memory block 38 stores the first information table 35, also stores second and believes
Table 37 is ceased, second information table 37 includes the second authentication information 371, the second encryption key 370 and the second other information 372.
3rd memory block 3G stores the 3rd information table 3E0.In a further preferred embodiment, antenna 3J can be high-frequency induction
Coil is to transmit and receive high-frequency signals, and the interface and communication control circuit 3K can be provided according to ISO 18000-3 communication interfaces
Communication and transinformation are set up with a reader, the electronic tag 3 has a label identifier 31 and a tag memory 34, should
Tag memory 34 is distinguished according to memory sections and block, and a Project Information Table 33, project letter can be set up in the tag memory 34
Cease table 33 and include first information table 35, the second information table 37 and the 3rd information table 3E0, the first information table 35 includes first
Authentication information 350, the first encryption key 352 and the first other information 354, the interface and communication control circuit 3K are according to the height
High-frequency signals are converted into tag processes instruction by frequency RFID communication interfaces regulation, for example, choose (Identify) electronic tag, reading
Take (Specific or Group Read) tag memory address, deposit (Specific or Group Write) tag memory
Address, pinning (Lock) tag memory address etc..
In one embodiment, the tagged items processing system 22 includes a reader 221, a local computer 222, one number
The display 225 of word keyboard 223 and one, the local computer 222 is connected through reader connecting line 22D with the reader 221,
It is connected, is connected through display connecting line 22F with the display 225 with the numeric keypad 223 through numeric keypad connecting line 22E.
In one embodiment, the local computer 222 is a computer, in a preferred embodiment, and the local computer 222 can be
One personal computer, a microcontroller, a micro computer or a work station.The reader 221 connects an antenna 224.It is preferable one
In embodiment, the local computer 222 has multiple USB ports, reader connecting line 22D, the numeric keypad connecting line
22E and display connecting line 22F have USB joint to be connected with the local computer 222.The tagged items processing system
System 22 is desirable that user inputs password via local computer 222, numeric keypad connecting line 22E and numeric keypad 223.
In one preferred embodiment, the numeric keypad 223 is the input keyboard of input numeral and word.The tagged items processing system 22
Message can be output it in visible mode via local computer 222 and display connecting line 22F and be sent to the display
225, it includes a liquid crystal display (LCD), or a transistor (LED) display, or is printed from a printer (Printer)
Out.In a preferred embodiment, the tagged items processing system 22 can also the mode of hearing output it message and be sent to
The built-in loudspeaker (Microphone) of local computer 222, or an external broadcaster (Speaker), or start a siren
(Alarm).The reader 221 can be a transmitting and the reader for receiving superfrequency RFID messages, and the reader 221 includes one
Interface and communication control circuit, the interface and communication control circuit should according to frame mode as defined in superfrequency RFID communication interfaces
The tag processes instruction of reader 221 is converted into the superfrequency signal for transmitting or receiving between the antenna 224.Another preferable
In embodiment, the reader 221 is a transmission and receives RFID high frequencies or the reader of other frequency messages, such as 433MHz,
The reader 221 includes an interface and communication control circuit, and the interface and communication control circuit are according to high frequency or other frequencies RFID
Frame mode as defined in communication interface by the instruction of the tag processes of the reader 221 be converted between the antenna 224 transmission or
The high frequency of reception or other frenquency signals.Again in a preferred embodiment, the reader 221 can combine both of the above simultaneously all
The reader for being, the reader 221 includes an interface and communication control circuit, and the interface and communication control circuit may be selected according to spy
Frame mode as defined in high-frequency RF ID communication interfaces regulation or high-frequency RF ID communication interfaces refers to the tag processes of the reader 221
Order is converted into the superfrequency signal or high-frequency signals for transmitting or receiving between the antenna 224.Between the antenna 224 and antenna 3J
Form a radio frequency identification dedicated channel 226.In one embodiment, the antenna 224 can be that less radio-frequency is distinguished with antenna 3J
Know UHF-antenna, the dedicated channel 226 is one several meter of long track (5 to 10 meters is over long distances) or a tens of rice
Long air duct (more than 100 meters are remote).Again in a preferred embodiment, the antenna 224 and antenna 3J can be nothings
Line radio-frequency discriminating radio-frequency induction coil, the dedicated channel 226 is the insulation matchmaker comprising air and plastics within 1 to 2 or several centimeter
It is situated between (less than 5 to 10 centimetres are short distance).Again in a preferred embodiment, the antenna 224 can form one simultaneously with antenna 3J
Group radio frequency identification UHF-antenna and one group of radio-frequency induction coil, to launch and receive superfrequency signal, or transmission and
Receive high-frequency signals.The tagged items processing system 22 can be through local computer 222, reader connecting line 22D, reader
221 and radio frequency identification dedicated channel 226 and electronic tag 3 carry out mutually transmitting data and authentication procedure.One compared with
In good embodiment, the reader 221 can be only fitted in same device with antenna 224, and there is the device plastic casing to be formed
Platform, the platform can carry the electronic tag 3.Again in a preferred embodiment, network connections 21 connect the tagged items
The local computer 222 of processing system 22 and network connection device 5, the tagged items processing system 22 is by the network connections 21
And the network connection device 5 is connected with internet 6 and wireless mobile network equipment 7, the local computer 222, the reader
221st, antenna 224, display 225 and the numeric keypad 223 are configured in the same apparatus, and such as device is a certification
ATM (Authenticating Automatic Teller Machine, abbreviation aATM), the aATM uses a card
Insertion groove can also be used an enclosed type platform to carry electronic tag 3 for insertion electronic tag 3, the aATM.Another preferable
In embodiment, the tagged items processing system 22 can be via local computer 222 and the mark of the reading electronic labels 3 of reader 221
Label sequence number is exported to a barcode machine (Label Printer) and being imprinted in visible mode and pasted on label, then sticks this
Labelling is attached to packing box, packaging bag or the pallet of a product, such as one dress ornament, or a dress product, for a RFID
Production Verification System makees shipping management and stock-taking or a RFID security certification system makees antitheft inspection.It is again preferably real one
Apply in example, the network connections 21 can be a radio network information channel, the tagged items processing system 22 by the network connections 21, should
Network connection device 5 is wirelessly connected with internet 6 and wireless mobile network equipment 7, by the local computer 222,
The reader 221, antenna 224, display 225 and the numeric keypad 223 are configured just forms one without traditional thread binding in the same apparatus
Put, the wireless device is a RFID certification readers, confess diligent member and read when turning out for work using the tagged items processing system 22
Be fixed on the electronic tag 3 at the station of route of turning out for work, road sign or patrol point, and by relevant station in the electronic tag 3,
The news in brief of the information and turn out for work route and the time composition of road sign or patrol point are sent to a RFID and turned out for work Verification System, as
One RFID attendance information systems set up a RFID real-time authentications alignment system (Real Time Authenticating
Locating System, RTALS) it is used.In a further preferred embodiment, there is the wireless device plastic casing to be formed
A hand grip or support, the wireless device is a handheld RFID certification reader, is recognized for hotel owner using a RFID commodity
Card system reads the electronic tag 3 pasted and be attached on a commodity, and inquires about the commodity number through the tagged items processing system 22
According to.In a further preferred embodiment, the tagged items processing system 22 is still applied and other through local computer 222 according to industry
Device with USB port and the connecting line for having USB joint are connected to input consumption information, and the device includes electronic weighbridge, bar
Code scanner, liquid flow measuring device, drinking-water flow measuring unit or global geographic coordinate setting device, the consumption information include the time, away from
From, weight, fluid flow, bar code or geographical position longitude and latitude, the consumption information is then converted into spending amount, so that it may
Paid using the financial cash certification card of the present invention.
In one embodiment, the radio frequency identification Verification System 2 further includes one or more other processing systems 24, network
Link 23 and connect other processing systems 24 and network connection device 5, other processing systems 24 are by the network connections 23, the net
Network attachment means 5 are connected with internet 6, wireless mobile network equipment 7.In a preferred embodiment, the network connections 23
Can be a radio frequency network channel, other processing systems 24 can be by the network connections 23, the network connection device 5 with nothing
Line mode is connected with internet 6, wireless mobile network equipment 7.Other processing systems 24 can be the same as the tag entry
The processing system 24 of mesh processing system 22, its comprising local computer 222, reader 221, antenna 224, display 225 and
Numeric keypad 223, can be used as a network finance certification machine (Network Used Financial Authenticating
Device, nuFAD), there is the reader 221 platform to be available for carrying electronic tag 3.In a preferred embodiment, this other
Processing system 24 can also include the processing system of other devices, and other devices include reader, electronic weighbridge, bar code and swept
Retouch instrument, drinking-water flow measuring unit or global geographic coordinate setting device.In a further preferred embodiment, other processing systems 24 can be with
Local computer 222, display 225 and numeric keypad 223 are only included, as the total of the radio frequency identification Verification System 2
Manage (Authenticating System Manager, ASM) or make the authentication information station (Authenticating of display inquiry
System Kiosk, ASK) or local data base (Local Database, LDB), it is also possible to work is a certificate server
(Authenticating Server, AS), such as printer server, transmitting-receiving mail server.Recognize in radio frequency identification
TIPS, LDB and ASM in card system 2 are equipped with title, code name, numbering or IP address for identification.Local computer
222 will use resource on network after its operating system is started, and for system security consideration, can use login user and input
User cipher interface manages the user of online.The radio frequency identification information system 1 further includes a database 4.Network connection
Device 5 links a tagged items processing system 22 and the database 4 with network connections 21, and the network connection device 5 connects with network
Knot 23 also links other processing systems 24 and the database 4.In one embodiment, the network connection device 5 may include line concentration
Device (Hub), signal gain device (Repeater), connect one or more tagged items processing systems 22 or its elsewhere in a wired fashion
Reason system 24, in this way, the tagged items processing system 22 of network connection device 5 and 1 or multiple or other shapes of processing system 24
Into a LAN, the LAN links through internet 6 with a shared database 4 again, the tagged items processing system 22
Can link with the database 4, set up data that are online and accessing the database 4, the database 4 according to RFID industries and
Using with a variety of functions, it includes the title or code name, the project code of electronic tag for inquiry tag Item Processing System
And its title or code name, the title or code name in shop and commodity, the title of bus route and station or code name, foundation business people
Unified number inquires about company or the title of mechanism or its code name, the title of cell or code name and its affiliated area and position and big
Building and floor and room, foundation user's deposit/drawings account number inquire about balance of deposits and personal information ... of account etc..Another
In embodiment, the network connection device 5 still includes a WiFi wireless access points (Wireless Access Point, AP), with nothing
Line mode connects one or more tagged items processing systems 22 or other processing systems 24, in this way, the network connection device 5 and 1
Multiple tagged items processing systems 22 or other processing systems 24 formation one WLAN, the WLAN again with
Internet 6, wireless mobile network equipment 7 and shared database 4 link, and the tagged items processing system 22 can be with this
Database 4 and the wireless mobile network equipment 7 set up data that are online and accessing the database 4, also can will be short through internet 6
News, image or news in brief and image are sent to the running gear of a display for having IP address or a reception news in brief number.Another
In embodiment, the network connection device 5 can in a wired fashion and wireless mode connects one or more tagged items processing systems simultaneously
System 22 or other processing systems 24, in this way, the tagged items processing system 22 of network connection device 5 and 1 or multiple or its elsewhere
The one Integrated LAN network of formation of reason system 24, the Integrated LAN network is again through internet 6 and shared database 4 and wireless mobile
Network equipment 7 is connected, and the tagged items processing system 22 can be with the internet 6, the database 4 and the wireless mobile
Network equipment 7, which sets up data that are online and accessing the database 4 or news in brief, image or news in brief and image are sent into one, IP
The display of address has the running gear for receiving news in brief number to one.In a preferred embodiment, when user in aATM or
When on nuFAD using a financial cash certification card, the tagged items processing system 22 may require that user is defeated using numeric keypad 223
Enter authentication password, the first stage authentication procedure of the application can the first certification financial cash certification card the true and false, just read by rear
The information for being stored in electronic tag 3 in the certification card is taken to include an authentication information, a deposit/drawings account number, the second stage of the application
Authentication procedure can confirm that the electronic tag 3 belongs to identical systems, and comparing the input authentication password should with certification with the authentication information
User's status, sets up online by rear ability with database 4, and the deposit/drawings account number is obtained from database 4 with the deposit/drawings account number
The balance of deposits, then through drawing operation procedure and the currency function of selecting the financial cash certification card to be enabled, so that it may one is withdrawn deposit
The amount of money is deposited into the financial cash certification card, and the transaction summarization can be sent to one have receive news in brief number running gear.
Referring to Fig. 2, it is the schematic diagram of electronic tag 3 of the preferred embodiment of the application second.Electronic tag in fig. 2
3 further show the Project Information Table 33 comprising the first authentication information 350, the first encryption key 352, first other letter
Cease the 354, second authentication information 371, the second encryption key 370, the second other information 372, the 3rd information table 3E0 and retain
Stored information in memory block 3B.First authentication information 350 includes a project code 357 and a Customs Assigned Number 355.
In one embodiment, the Customs Assigned Number is a system constant value, in a preferred embodiment, and the Customs Assigned Number is a system designator code number
Word.First other information 354 includes the PC information 351 of bullets 358 and the first, and wherein the first PC information 351 is to refer to
Show the reading memory block RB1 in the first information table 35 such as Fig. 1, in one embodiment, the first PC information 351 is ISO
18000-6C communication interfaces provide or function identical protocol integrated test system (Protocol Control, PC) word group that the PC word groups can
For being block count comprising a first information table length value, first encryption key 352 includes the second sub-information 353 of encryption,
Second sub-information 353 is that the second information table length value is block count.The decryption of tagged items processing system 22 first encryption is close
Key 352 reads the reading memory block RB2 in second information table 39 such as Fig. 2 to obtain second sub-information 353.This second
Authentication information 371 includes deposit/drawings password 375, faces cabinet password 377, credit clip pin 37A and cash card remaining sum 379.This
Two other informations 372 include deposit/drawings account number 374, credit card number 376 and cash card balance amount information 378.In an embodiment
In, the 3rd information table 3E0 includes account transfer account number table 3E1, and in a preferred embodiment, the 3rd information table 3E0 can be included
RFID pass through control card 3E2, receive news in brief directory 3E3, or more combination.Reserved memory block 3B save projects are destroyed
Password 3B1 and project access to your password 3B2.The Project Information Table 33 further includes project destruction password 3B1 and project access is close
Code 3B2.Second encryption key 370 is a link key, and second encryption key 370 includes the 3rd sub-information 373, the 3rd
Sub-information 373 is that the 3rd information table length value is block count, and in one embodiment, tagged items processing system 22 is according to the 3rd
Sub-information 373 is preferable one to read the 3rd information table 3E0 in user memory block 3E and using account transfer account number table 3E1
Then it is use RFID current control card 3E2 or reception news in brief directory 3E3 in embodiment.
In fig. 2, second memory block 38 includes first memory block 36, and the is stored in second memory block 38
One information table 35 and the second information table 39.In a preferred embodiment, the second memory block 38 can not include the first memory block
36。
Included referring to Fig. 3, it is the preferred embodiment of the application the 3rd in financial credit cash certification card (not shown)
One electronic tag 30 sets up the parameter configuration schematic diagram of a Project Information Table 33 according to its tag memory address.As shown in figure 3, the figure
Be in units of the word group of 16, encryption key used in the electronic tag of display the application certification one, the password of multigroup purposes,
And a Project Information Table 33 for having a coding parameter, the parameter in the Project Information Table 33 has a plurality of word group, for example:
Project code 357, credit clip pin 37A, face cabinet password 377, cash card shop coding 37G, cash card goods number 37I etc. and be
One word group parameter, cash card remaining sum 379 is two word group parameters, and the first encryption key 352, the second encryption key 370, deposit/drawings are close
375 grades of code are three word group parameters, and deposit/drawings account number 374, credit card number 376 etc. is four word group parameters.The one word group parameter it
0th to the 15th totally 16 can be with parameter name [15:0] represent, such as project code [15:0], credit clip pin [15:0], face
Cabinet password [15:0], cash card shop coding [15:0], cash card goods number [15:0] etc., the 0th of the two words group parameter to
31st totally 32 can be with parameter name [31:0] represent, such as cash card remaining sum [31:0], and the 0th of the two words group parameter the to
15 totally 16 be its first word group can be with parameter name [15:0] represent, such as cash card remaining sum [15:0], the two words group parameter
The the 16th to the 31st totally 16 be its second word group can be with parameter name [31:16] represent, such as cash card remaining sum [31:16],
The the 0th to the 47th of the three words group parameter totally 48 can be with parameter name [47:0] represent, such as the first encryption key [47:0],
Two encryption keys [47:0], deposit/drawings password [47:0] etc., and the 0th to the 15th of the three words group parameter totally 16 for its first
Word group can be with parameter name [15:0] represent, such as the first encryption key [15:0], the second encryption key [15:0], deposit/drawings password
[15:0] etc., the 16th to the 31st of the three words group parameter totally 16 be that its second word group can be with parameter name [31:16] represent,
Such as the first encryption key [31:16], the second encryption key [31:16], deposit/drawings password [31:16] etc., the three words group parameter it
32nd to the 47th totally 16 be its 3rd word group can be with parameter name [47:32] represent, such as the first encryption key [47:32]、
Second encryption key [47:32], deposit/drawings password [47:32] etc., the 0th to the 63rd of the four words group parameter can join for 64 totally
It is several to claim [63:0] represent, such as deposit/drawings account number [63:0], credit card number [63:0] etc., and the 0th of the four words group parameter to
15th totally 16 be its first word group can be with parameter name [15:0] represent, such as deposit/drawings account number [15:0], credit card number
[15:0] etc., the 16th to the 31st of the four words group parameter totally 16 be that its second word group can be with parameter name [31:16] represent,
Such as deposit/drawings account number [31:16], credit card number [31:16] etc., the 32nd to the 47th of the four words group parameter totally 16 be it
3rd word group can be with parameter name [47:32] represent, such as deposit/drawings account number [47:32], credit card number [47:32] etc., this four
The the 48th to the 63rd of word group parameter totally 16 be its 4th word group can be with parameter name [63:48] represent, such as deposit/drawings account number
[63:48], credit card number [63:48] etc..In a preferred embodiment, the block count of parameter can be according in the Project Information Table 33
Industry and application demand and change, or some parameters can be substituted, deleted or added, for example:When close without using the second encryption
During key 370, second encryption key 370 can be substituted with the reception news in brief number 370 of one or three word groups or four word groups.The electronic tag
30 tag memory 34 is provided or function identical tag memory using ISO 18000-6C communication interfaces are met.The electronic tag
30 have reservation (Reserved Memory, RM) memory block 3B, label identifier (Tag Identifier, TID) memory field
Block 3C, unique items identifier (Unique Item Identifier, UII) memory block 3D and user memory block 3E
(User Memory,UM).The tag memory 34 is divided into 4 by the electronic tag 30 according to most left 2 of its tag memory address
Memory bank (Memory Bank), this most left 2 are 002Represent TID memory blocks 3C and store a label sequence number 313 and one
Manufacturer's numbering 314,012Represent UII memory blocks 3D and store first information table and the second information table, 102Represent in the RM
Deposit block 3B and store project and destroy password 3B1 and project and access to your password 3B2 and 112Represent UM memory blocks 3E storages
The 3rd information table, the label sequence number 313 be three word group parameters, its 0th to the 15th totally 16 be its first word group, its 16th
To the 31st totally 16 be its second word group and its 32nd to the 47th totally 16 be that its 3rd word group can be respectively with label sequence
Numbers [15:0], label sequence number [31:16] and label sequence number [47:32] represent, manufacturer's numbering 314 is a word group parameter,
Its 0th to the 15th totally 16 can number [15 with manufacturer:0] represent, the project destroys password 3B1 and the project accesses to your password
3B2 be two word group parameters, its 0th to the 15th totally 16 be its first word group can respectively with project destroy password [15:0] and item
Mesh accesses to your password [15:0] represent, its 16th to the 31st totally 16 be its second word group can respectively with project destroy password [31:
16] and project accesses to your password [31:16] represent.The preferred embodiment of the application the 3rd applies the present invention to make financial circles
Financial credit cash certification card, such as the financial credit cash certification card face cabinet service, selection comprising selection bank and make extra-high
The cash certification card of frequency long range or financial cash certification card or credit cash certification card, selection make the short-range finance of high frequency
Cash certification card or credit cash certification card or financial credit cash certification card, selection and enterprise or mechanism jointly make superfrequency
The cash certification card of long range or financial cash certification card or credit cash certification card and selection are jointly made with enterprise or mechanism
Make the short-range cash certification card of high frequency or financial cash certification card or credit cash certification card, and can also be the cash certification
The selection of cash card remaining sum 379 of card makes a kind of kind of currencies to store cash, then just the cash certification card can be used to enter
Row cash consumption or Stored Value.
Referring to Fig. 3, the memory address 400 in UII memory blocks 3DH~47FHIt is the in Fig. 2 to have 8 word groups
One memory block 36 stores the first information table 35, and memory address 480H~5FFHThere are 24 word groups to store second letter
Cease table 37.In one embodiment, the tagged items processing system 22 is chosen and checked via reader 221 in the first authentication phase
During electronic tag 3, the first information table 35 is the information that the electronic tag 3 replys the reader 221 in backscattering mode, inspection
Testing the length value of the first information table 35 can confirm to belong to identical systems with the electronic tag 3, and the first information table 35 includes
First PC information 351, project code 357, bullets 358, Customs Assigned Number 355, the first encryption key 352 and a CRC are detectd
Error code, the Customs Assigned Number 355 is since the Customs Assigned Number 1.In a preferred embodiment, the Customs Assigned Number 355 is a project
Deadline.In a further preferred embodiment, the Customs Assigned Number 355 is system designator code numeral, represents and is set up in an electronic tag
Project Information Table system, system designator code numeral includes representing financial certification authority card system with 1,2 represents finance cash certification card
System, 3 represent credit cash certification card system, 4 represent financial credit cash certification card system.The tagged items processing system 22
In the second authentication phase, the information of the second information table 37 in the electronic tag 3 is read via reader 221, it includes deposit/drawings
Account number 374, credit card number 376, deposit/drawings password 375, credit clip pin 37A, face cabinet password 377, compare the frequency of failure
37E, the second encryption key 370 and a cash card balance amount information 378, the cash card balance amount information 378 include cash card remaining sum
Currency 37F, cash card shop coding 37G, cash card goods number 37I, cash card boarding station numbering 37J and cash card make
Use state 37K.In a preferred embodiment, the length value of first information table 35 is that block count can be according in UII memory blocks 3D
Different Industries and application demand and change, it is not limited to 8 word groups.The tagged items processing system 22 is in successfully passing first
After authentication phase, TID memory blocks 3C manufacturer's numbering 314 and label sequence number 313 is read.In one embodiment, the mark
Item Processing System 22 is signed when frequency of failure 37E is compared more than a comparison frequency of failure maximum, the tagged items processing system
System 22 can produce one group of project according to the label sequence number 313 and destroy password value to start a destruction electronic tag program, the electronics
Label 3 can not just talk with the tagged items processing system 22 again.
In figure 3, electronic tag 30 is a word group for having 16 comprising one the oneth PC information 351, and the first PC information
The 0th of 351 has 16 to the 15th can be with PC [15:0] represent, the 0th to the 4th totally 5 representative of the first PC information 351
First sub-information can be with PC [4:0] represent, for control read the UII memory blocks block count, the first PC information 351 it
5th to the 15th totally 11 can be with PC [15:5] represent, although the PC [15 in ISO 18000-6C communication interfaces regulation:5] nothing
The block count for reading the UII memory blocks is closed, but must also be set according to the regulation.In a preferred embodiment, other are communicated
Interface regulation can reduce PC [15:5] digit of 11 to increase by the first sub-information, it is possible to which more word group is read in control
Number.In order that the authentication phase of tagged items processing system 22 first only reads first information table 35, therefore in setting up the electronics mark
The PC [4 when signing 30:0] it is to be set comprising a first information table length value, for example, 7, the length of expression first information table 35
For 8 word groups, and tagged items processing system 22 obtains the second sub-information 353 when the first encryption key 352 is decrypted, for example
For 23, it is 24 word groups to represent the length value of second information table 37, examines the i.e. identifiable electronics mark of second sub-information 353
The true and false of label 3 and confirmation belong to identical systems with the electronic tag 3.In one embodiment, the method for reading memory block RB2
It is that the initial address for specifying second memory block 38 reads block count with one.In a preferred embodiment, termination address quilt
It is preset as 01000B, with 5 positions 11111BRepresent from initial address 11111BStart, to successively decrease, 1 mode reads the memory block
RB2, to termination address 01000BHave 24 block counts.In another embodiment, second memory block 38 is specified together
Beginning address with a termination address to read memory block RB2.Identical method also can be used to read according to the 3rd sub-information 373
Take memory block RB3.
In figure 3, the project code 357 for having a coding is set up according to the application 3rd embodiment, makes the electronic tag 30
For a Project Information Table for having coding.The project code 357 is the word group of one 16, its 0th to the 15th have 16 can be with
Project code [15:0] represent, in one embodiment, setting up the method for the project code 357 is included the project code [15:0]
16 classification such as:Project code [15:13] represent the 13rd to the 15th of the project code 357 totally 3 represent RFID industries
Subclassification, project code [12:11] represent the 11st to the 12nd of the project code 357 totally 2 represent RFID device subclassification,
Project code [10:9] represent the 9th to the 10th of the project code 357 totally 2 represent RFID selections enable function subclassification,
Project code [8:6] represent the 6th to the 8th of the project code 357 totally 3 represent RFID functions subclassification and project is compiled
Code [5:0] represent the 0th to the 5th of the project code 357 totally 6 represent RFID and implement 4 subclassifications such as national subclassification and compile
Code.In one embodiment, the coded system of the RFID industry subclassifications still is made to change, the RFID according to RFID industries and application
Industry subclassification is the project code [15:13] 3 definables, 8 kinds of RFID industries are such as:000BRepresent financial circles, 001BRepresent
Communications, 010BRepresent logistics, 011BRepresent supply chain, 100BRepresent project level and follow the trail of industry, 101BRepresent gate inhibition and Assets Reorganization Taking
Manage industry, 110BRepresent scientific and technological industry, and 111BSystem of representatives blanket insurance stays industry.
The RFID device subclassification is the project code [12:11] 2, be manufacture according to electronic tag and and electronics
Label is combined with other devices and must be divided into 4 kinds of devices, in one embodiment, the project code [12:11] it is 00BThen represent with
Electronic tag 3 combine be it is non-conductive paste label (Adhesive Label) device, be 01BThen represent and electronic tag 3
With reference to be nonconductive plastic material packaging system, the shape of the device is the card-shape with a thickness, box-like, circle, polygon many
Angular or one people's things of symbol or the shape in area, are 10BThe sensing device combined with electronic tag 3 is then represented, it includes
Electronic tag 3 is combined with a network indicator or running gear to receive, show and store the device of news in brief or image, is 11B
It is other materials device then to represent combined with electronic tag 3, such as using non-conductive timber, leather, non-woven or will be non-
Conductive material is attached to any and any combination encapsulating material of metal.
RFID selections enable function subclassification for the project code [10:9] 2, be to be directed to each RFID industry
What subclassification user selection to be combined enables function (Enabler), in one embodiment, when the RFID industries subclassification is finance
During industry, the project code [10:9] it is 00BRepresentative enables finance, credit, faces cabinet service, gate inhibition, project level tracking and cash
The functions such as consumption, are 01BRepresentative enable finance, credit, face cabinet service, cash consumption, the selection of closing balance currency, gate inhibition, with
And project level follow the trail of etc. function, 10BRepresentative enable finance, credit, face cabinet service, cash consumption, transmission news in brief, gate inhibition and
The functions such as project level tracking, are 11BRepresentative enables finance, credit, faces the functions such as cabinet service, cash consumption and system be reserved.
The RFID functions subclassification is the project code [8:6] 3, be according to electricity for a kind of RFID industries subclassification
The function distinguishing that is combined is into 8 kinds of RFID function choosing-items in application for subtab, for example:When the RFID industries subclassification is finance
During industry, the project code [8:6] it is 000BRepresent with finance, credit, face cabinet service, cash consumption, transmit news in brief and by
The functions such as dynamic formula superfrequency long range, are 001BRepresenting has finance, credit, faces cabinet service, cash consumption, transmit news in brief, show
The functions, 010 such as the golden selection of remaining sum currency and passive type superfrequency short distanceBRepresenting has finance, credit, faces cabinet service, shows
Gold consumption, the transmission function such as news in brief and passive type superfrequency short distance, are 011BRepresent with finance, credit, face cabinet clothes
Business, cash consumption, the transmission function such as news in brief and the high memory size of passive type superfrequency short distance, are 100BRepresenting has gold
Melt, credit, face cabinet service, cash consumption, transmission the function such as news in brief and high frequency short distance, be 101BRepresent with finance, letter
With, face the functions such as cabinet service, cash consumption, transmission news in brief, cash card remaining sum currency and high frequency short distance, be 110BRepresent
With finance, face cabinet service, cash consumption, transmission news in brief, gate inhibition, project level tracking and passive type superfrequency long range etc.
Function, is 111BRepresent with finance, face cabinet service, cash consumption, transmission news in brief, gate inhibition, project level follow the trail of and high frequency it is short
The functions such as distance.In a preferred embodiment, when the RFID industries subclassification is communications, the project code [8:6] it is
000BRepresenting has remote (more than the 50-100 meters) function of semi-passive (Semi-passive) superfrequency for high-speed railway
And position and use between bus traveling, it is 001BRepresenting has semi-passive superfrequency remote and high memory size (8k bytes
More than) function, it is 010BRepresenting has passive type superfrequency long range (more than 5-10 meters) function so that patrol is positioned and automatic
Change intelligent parking lot to use, be 011BRepresenting has passive type superfrequency over long distances and high memory size (more than 64k bytes) work(
Can, it is 100BRepresenting has passive type superfrequency closely (less than 50-100 centimetres) function is used for automated parking ground,
For 101BRepresenting has passive type superfrequency closely and high memory size function, is 110BRepresenting has passive type high frequency short distance
From (less than 5-10 centimetres) function for gate inhibition's control and patrol positioning use, be 111BRepresenting has passive type high frequency short distance
And high memory size function etc..
It is the project code [5 that the RFID, which implements national subclassification,:0] 6, can for a kind of RFID industries subclassification according to
Implement country according to the RFID of electronic tag, be divided into 64 countries and region, in one embodiment, the project code [5:0] it is 01H
Australian Realm is represented, is 20HTaiwan area is represented, is 60HRepresent area ... of the U.S. etc..
In summary for the explanation of project code 357 and its each subclassification, tagged items processing system 22 can be according to production
Industry and application are to the project code [15:0] encoded, for example:In one embodiment, when project code [15:0] it is 0981H
When, the plastic clip RFID device for Australian Realm financial circles is represented, and enable finance, credit, face cabinet service, cash consumption, biography
The RFID functions such as news in brief, gate inhibition, project level tracking and passive type superfrequency long range are sent, in another embodiment, work as project
Coding [15:0] it is 0A68HWhen, the plastic clip RFID device for Taiwan area financial circles is represented, and enable finance, credit, face cabinet
Service, cash consumption, transmission news in brief, the selection of closing balance currency, gate inhibition, project level tracking and passive type superfrequency length away from
From grade RFID functions.Set up in the electronic tag 30 after a project code 357, the project code 357 can be used as this
Applying label Item Processing System 22 chooses the basis of electronic tag 3 via reader 221.
In figure 3, according to the 3rd embodiment of the application, have a bullets 358 has the word group of 16 for one, and is somebody's turn to do
The 0th of bullets 358 to the 15th totally 16 can be with bullets [15:0] represent, the method for setting up the bullets 358
It is to be numbered for the RFID industries subclassification of a project code 357 according to its tissue, in one embodiment, when the project is compiled
When the RFID industries subclassification of code 357 is financial circles, the bullets [15:0] it is 0007HBank One Corp. can be represented, is 0013H
Shi Hua banks of Cathay can be represented, in another embodiment, when the RFID industries subclassification of the project code 357 is logistics,
The bullets [15:0] it is 1010HYML company ... etc. can be represented.In a preferred embodiment, the bullets 358
System for the project code 357 RFID industries subclassification according to the son such as its area, position, building (Building) and floor
Classify to be numbered.
In figure 3, according to the 3rd embodiment of the application, have a Customs Assigned Number 355 has the word group of 16 for one, and is somebody's turn to do
The 0th of Customs Assigned Number 355 to the 15th totally 16 can be with Customs Assigned Number [15:0] represent, in one embodiment, set up the user
The method of numbering 355 is numbered in order for the user using the project code 357 and the bullets 358, for example, exist
The resident family of the customer or a cell in the student of one school or a member system shop or the employee of a company or a production are online
Product and encapsulation product etc. all can in order be numbered since 1.In a preferred embodiment, without using the project code 357 and
The bullets 358, the Customs Assigned Number 355 can be set as since 1 in order by the application tagged items processing system 22
Numbering, or it is set as the Project Information Table system that a system designator code digitized representation is set up in an electronic tag, it was included with 1 generation
Table financial certification authority card system, 2 represent financial cash certification card system, 3 represent credit cash certification card system, 4 represent finance and believe
Certification card system, 5 represent financial gate inhibition's certification card system, 6 represent financial cash gate inhibition's certification card system, 7 represent and believe in cash
Gate inhibition's certification card system, 8 represent financial credit cash gate inhibition's certification card system in cash.In a further preferred embodiment, this
Mesh coding 357 represents that project level follows the trail of industry and is implemented on the plastic cards that Taiwan has cash consumption passive type high frequency short-range function,
, can be by 16 classification of the Customs Assigned Number 355 such as and the bullets 358 represents a RFID fabrications company:Customs Assigned Number [15:
8] represent the 8th to the 15th of the Customs Assigned Number 355 totally 8 represent groups of users (Group) subclassification and Customs Assigned Number [7:
0] represent the 0th to the 7th of the Customs Assigned Number 355 totally 8 represent 2 sub- sorting code numbers such as special discount subclassification, for example exist
In one public transportation bus system, the groups of users subclassification is Customs Assigned Number [15:8] 8 and special discount point
Class is Customs Assigned Number [7:0] 8 can define simultaneously, for example:01DIt is 100 for its special discount of general passenger %D、02DFor army
Alert its special discount % is 80D、04HIt is 70 for its special discount of student %D、05DIt is 0 for its special discount of bus employee %D、
06DIt is 50 for bus employee its special discount of family members %D、08DTo respect the aged people, its special discount % is 50DAnd 10DFor love its
Special discount % is 50D... etc..
In a preferred embodiment, tagged items processing system 22 is not built in the electronic tag 30 according to aforesaid class method
Vertical project code [15:0], bullets [15:0] and Customs Assigned Number [15:0], such as user does not need RFID industries son point
Class, RFID selections enable function subclassification, RFID functions subclassification, RFID device subclassification and RFID and implement state home point
The coding of class, then can be by the project code [15 of two 16:0] and bullets [15:0] it is connected, for setting up 1
The mechanism identifier [31 of position:0], such as according to business region and the items of business represent a company or the title of mechanism or its code name or
Its people's Unified number of doing business.Again in a preferred embodiment, the project code 357 and the bullets 358 are a mechanism, handset
The hybrid coding of structure and building.
In figure 3, the application uses a plural authentication method in a financial cash certification card (not shown) electronic tag 30
The second authentication information 371 set up in second information table 37 needed for second authentication phase and the second other information 372, this second is recognized
Card information 371 includes deposit/drawings password 375, faces cabinet password 377, credit clip pin 37A and cash card remaining sum 379, and this second
Other information 372 includes deposit/drawings account number 374, credit card number 376 and cash card balance amount information 378.In an embodiment
In, the method for certification second authentication information 371 is the tagged items processing system before using second other information 372
22 authentication passwords first to input user are distinguished compared with choosing one group of authentication information from second authentication information 371 pair
Whether both are identicalIn one embodiment, when user, which holds a financial certification authority card, comes bank's processes financial business, tag entry
Mesh processing system 22 first starts, is placed on as long as the teller user holds it on financial certification authority card and is attached to reader 221
On platform, then will the user input an authentication password using numeric keypad 223, tagged items processing system 22 is according to local meter
The setting of the computer classification (CompType) of calculation machine 222, the computer classification has first been set as facing cabinet service computer, certainly should
Choose an authentication information in second authentication information 371 to face cabinet password 377, then by it compared with the password that the user inputs
It is right, after comparison is errorless, it must just use the deposit/drawings account number 374 to carry out follow-up deposit/drawings transaction, so, bank is not only in the use
There is provided when transaction is handled at family and exempt to fill in the intimate service of deposit/drawings document, protection machine also is added to user's deposit/drawings account information
System.In a preferred embodiment, it can be financial in opening a bank account and bidding to host one in user to produce the method for facing cabinet password 377
When certification card, bank simultaneously also provide transmission short message service, user can receive a deposit/drawings account number 374, a financial certification authority card,
And one be predetermined face cabinet password 377, have the corresponding financial certification authority of deposit/drawings account number 374 and one on the financial certification authority card
Card card number, as long as bank cashier sets up the deposit/drawings account number corresponding with user's master data in the database 4 of bank
374 or the financial certification authority card card number, the financial certification authority card just can be used in user.And bank is when the financial certification authority card is set up,
One reception news in brief number 370 can be predetermined to be a default value, and face cabinet password 377 to produce random code mode default one, with
The deposit/drawings account number 374 is stored in the financial certification authority card in the lump, can be at any time via tag entry when the user is receiving the card
Mesh processing system 22 faces cabinet password 377 to change this and faces cabinet password 377 according to what this was predetermined, and is intended to receive the number of news in brief
It is stored in the financial certification authority card.In a preferred embodiment, when user uses a financial credit certification card on aATM, label
Item Processing System 22 is set as aATM and the certification class of user's selection according to the computer classification of local computer 222
Not, an authentication information can be chosen from second authentication information 371, the authentication information can be deposit/drawings password 375 or credit
Clip pin 37A.The method for producing the deposit/drawings password 375 and credit clip pin 37A can be in opening a bank account simultaneously in user
When bidding to host a financial credit certification card, bank simultaneously also provide transmission short message service, user can receive a deposit/drawings account number 374 or
The finance letters of credit clip pin 37A and one that the deposit/drawings password 375 or one that one credit card number 376, one is predetermined is predetermined
With certification card, as long as bank cashier sets up the deposit/drawings account number corresponding with user's master data in shared database 4
374 or credit card number 376, the financial credit certification card just can be used in user.And bank is in setting up the financial credit certification
During card, a reception news in brief number 370 can be predetermined to be a default value, and a deposit/drawings password is preset to produce random code mode
A 375 or credit clip pin 37A, is stored in the financial credit with the deposit/drawings account number 374 or the credit card number 376 and recognizes in the lump
, can be close according to the deposit/drawings that this is predetermined via tagged items processing system 22 at any time when user is receiving the card in card
Code 375 or the credit clip pin 37A that is predetermined change the deposit/drawings password 375 or credit clip pin 37A, and are intended to connect
The number for receiving news in brief is stored in the financial credit certification card.When the financial certification authority card is in addition to comprising a cash card remaining sum 379, still
During comprising a cash card remaining sum currency 37F, bank cashier can first confirm that user has enabled currency conversion, then be needed according to user
To be withdrawn deposit from its deposit/drawings account number 374, perform currency conversion, then by Withdrawal Amount unloading in the cash of the financial certification authority card
In card remaining sum 379, to facilitate the user to carry.In a further preferred embodiment, when user uses a financial credit on nuFAD
During certification card, tagged items processing system 22 can first verify the financial credit certification card the true and false and with the financial credit certification card
Belong to identical systems, then the computer classification according to local computer 222 is set as nuFAD, and according to user selection
Certification classification, an authentication information can be chosen from second authentication information 371, the authentication information can be deposit/drawings password
375th, cabinet password 377 or credit clip pin 37A are faced, the user can inquire about deposit/drawings account number remaining sum, credit card remaining sum, also may be used
So that currency conversion is withdrawn deposit, performed from its deposit/drawings account number 374, then by its Withdrawal Amount unloading in the financial credit certification card
In cash card remaining sum 379, in a further preferred embodiment, the transaction summarization is sent to this and connect by tagged items processing system 22
Receive news in brief number 370 and be used as authority and another authentication mode.
In a preferred embodiment, the plural authentication method is believed in a cash certification card (not shown) electronic tag 30 second
The second authentication information 371 set up in breath table 37 needed for second authentication phase, second authentication information 371 includes a cash card
Remaining sum 379, the method for the certification cash card remaining sum 379 is that before being withholdd, item label processing system 22 will first be verified
Deduct cash card Yu E≤0 after spending amountReferring to Fig. 3, the plural authentication method will be screened needed for the first authentication phase
The data of electronic tag are built in the first information table 35 of electronic tag 30, the first information table 35 comprising project code 357,
Bullets 358, Customs Assigned Number 355, the first PC information 351 and the first encryption key 352, the cash certification card just possess
Antiforge function simultaneously belongs to a cash certification card system, and the project code 357 and the bullets 358 can represent company or mechanism
Title or its code name or its people's Unified number of doing business, choose the electronic tag 30 as the item label processing system 22
Basis, possesses anti-fraud functional cash certification card and also can be used for RFID project levels to follow the trail of industry such as:One shopping cash certification card with for
Buy on behalf thing gift volume and shopping and cash consumption, one by bus cash certification card with by bus and substitute the change of riding for be inconvenient to deposit,
One books cash certification card is to pass in and out library and pay library and cash consumption, an amusement cash certification card to pass in and out amusement
Area and the public place of entertainment and cash consumption, a cash consumption certification card are paid to pay cash consumption, a phone cash certification in shop
Card is consumed with dialing public telephone and cash payment.
Please also refer to Fig. 2 and Fig. 3, the application in order to allow cash certification card to be used in the shop of different businesses as consumption,
Being set up in the cash card balance amount information 378 has the cash card shop coding 37G of a coding to be a word group for having 16, and the cash
The the 0th to the 15th of card vendor shop coding 37G, which has 16, to encode [15 with cash card shop:0] represent, set up cash card vendor
Shop coding 37G method is that the cash card shop is encoded into 37G 16 classification such as:Cash card shop coding [15:12] represent
The the 12nd to the 15th of cash card shop coding 37G represents shop business subclassification, cash card shop coding [11 for totally 4:6]
Represent that cash card shop coding the 6th to the 11st of 37G represents shop business tissue subclassification and cash card vendor for totally 6
Shop coding [5:0] represent that cash card shop coding the 0th to the 5th of 37G represents shop branch tissue subclassification etc. 3 for totally 6
Individual sub- sorting code number.In a preferred embodiment, 4 of shop business subclassification can classify such as:1HRepresent transportation service
Industry, 2HRepresent food and beverage industries, 3HRepresent retail business, 4HRepresent general merchandise industry, 5HRepresent household electrical appliances industry, 6HRepresent show business, 7HGeneration
Table path industry and other values represent the shop business subclassification retained, and 6 of shop tissue subclassification are to be directed to a business
Shop business subclassification is numbered, such as is that retail business can classify such as shop business subclassification:01HRepresent 7-11 chain
Convenience store, 02HRepresent whole family's convenience store, 03HRepresent Yong Bao fresh fruits company, 04HNorth and south coarse cereals company, 05HRepresent good fortune
Good fortune drinks manufacturer, 06HRepresent daily automatic vending company and other values system of representatives blanket insurance stays shop to organize subclassification, and pin
It is that transport service industry can classify such as to shop business subclassification:01HRepresent Taibei passenger company, 02HRepresent head and superintend and direct passenger traffic public affairs
Department, 03HThe shop tissue subclassification that representative too beep stop companies and other combination system of representatives blanket insurances are stayed, and the shop
Branch tissue 6 of subclassification is to do business subclassification for a shop and shop tissue subclassification is encoded, for example for
Shop business subclassification can classify such as too the beep stop companies of transport service industry:01HRepresent Taibei intellectual circle branch company,
02HRepresent peach garden Zhong Li branch companies, 03HRepresent Tai Zhong clear water branch company, 04HTai Nan Yongkangs branch company, 05HRepresent in peach garden just
Airport branch company and other combinations represent the shop branch tissue subclassification of reservation.In summary compiled on cash card shop
Cash card shop can be used to encode [15 for the explanation of code and its subclassification coding, tagged items processing system 22:0] to a cash card
Consumption shop is encoded, for example:Cash card shop coding [15:0] it is 10C5HThe place for representing customer consumption is in a transport
Too the beep stop companies of service trade are in the branch company of Chiang Kai-Shek International Airport in Taoyuan.In a preferred embodiment, the cash card shop
Coding 37G, which can be adjusted to 2 word groups, makes its shop business subclassification, shop business tissue subclassification and shop branch tissue
The digit of subclassification increases to cover greater number of business tissue and its branch.
In figure 3, the application is in the cash card goods number 37I that the cash card balance amount information 378 foundation has a coding
One has a word group of 16, and the 0th to the 15th of cash card goods number 37I totally 16 can be with cash card goods number [15:
0] represent, the method for setting up cash card goods number 37I is that 37G shop definitions shop is encoded for a cash card shop
In each commodity be numbered, in a preferred embodiment, the cash card goods number [15:0] compiled for the cash card shop
Code 37G carries out 1 to 65,536 goods number wherein 2020 for the chain super business of 7-11 of retail businessDA box banana is represented, one
In preferred embodiment, state light passenger company progress 1 of the 37G for transport service industry is encoded for the cash card shopDTo 9999DBar
Bus transit route is numbered, wherein cash card goods number [15:0] it is 1818DRepresent the long-distance public transport from the Taibei to middle hole
Bus or train route line, in a preferred embodiment, encodes 37G for the cash card shop and is carried out for the online game global corporation of show business
1DTo 9999DPlant video game numbering, wherein cash card goods number [15:0] it is 100DRepresent a kind of network electricity of heroic alliance
Competition game is played, or north and south coarse cereals company progress 1 of the 37G for retail business is encoded for the cash card shopDTo 9999DPlant business
Product are numbered, wherein cash card goods number [15:0] it is 54DRepresent soya bean.
In figure 3, the application is when user makees cash consumption using a cash certification card, tagged items processing system 22 according to
Cash card shop encodes 37G and cash card goods number 37I and carries out the preposition processing (Preprocessing) of consumption, it include according to
The true and false according to the plural authentication mode certification cash certification card and belong to identical systems, then will start to measure commodity it
The commodity consumption information such as time, distance, weight or flow writes the cash certification card, or in a preferred embodiment, reads
The one non-commodity consumption information for measuring commodity, the commodity consumption information includes commodity bar code or its code name or its title.One
In embodiment, when user is when showing its cash certification card before the device of tagged items processing system 22 and checking out, the tagged items
Processing system 22 can again according to the plural authentication mode certification cash certification card the true and false and belong to identical systems, display is measured
Time, distance, weight or the flow of the measurement commodity, and read measurement commodity pass from the monovalent tables of data of a commodity unit
In the unit and unit price of time, distance, weight or flow, the commodity consumption information for measuring commodity is converted into cash consumption gold
Volume, or in another embodiment, the unit and unit price that non-measurement commodity are read from the monovalent tables of data of the commodity unit are shown,
And the quantity of non-measurement commodity is obtained, it will also obtain the non-commodity consumption information for measuring commodity and be converted into the cash consumption amount of money, so
Deducting the cash consumption amount of money from the cash card remaining sum of user's cash certification card afterwards, and show and record the transaction includes transmission
News in brief or Email are to the reception news in brief number 370.In one embodiment, when passenger shows a cash certification card, to take one remote
During the bus of journey Bus Transportation company, the bus uses a wireless bus charging authentication system, and the wireless bus is received
Take Verification System with a tagged items processing system 22, the tagged items processing system 22 can the first certification cash certification card it
The true and false, belong to identical systems and by bus use state 37K, the Station XXX 37J that then will get on the bus is stored in the cash certification card
In, when passenger getting off car shows same cash certification card, the tagged items processing system 22 again the certification cash certification card it
The true and false, belong to identical systems and by bus use state 37K, distance by bus calculated by passenger getting on/off Station XXX,
And it is converted into the cash consumption amount of money, then deduct the cash consumption amount of money from the cash card remaining sum of the cash certification card.Please
Refering to Fig. 3, the application is in the electronic tag 30 except encoding 37G and cash card goods number 37I using the cash card shop
Carry out outside the preposition processing of consumption, still setting up has a Customs Assigned Number 357 (calling Rate in the following text), a cash card remaining sum 379 (to call in the following text
Balance), cash card use state 37K (calling Status an in the following text) and cash card boarding station numbering 37J (Last
Station ID, call LastSID in the following text), it is the use that the application tagged items processing system 22 is used for following the trail of a cash certification card
State, in one embodiment, user hold a financial credit cash certification card and take a long-range passenger company bus, the bus
Using a wireless bus charging authentication system, the wireless bus charging authentication system has a tagged items processing system
22, the tagged items processing system 22 includes a local computer, a reader, a display 225, a keyboard, a wireless network
Network attachment means and one group of systematic parameter, the wireless network attachment means provide second wireless channel, this group of systematic parameter bag
Containing a traffic route numbering, a roadway line number according to table and one by bus rate carfare tables of data, the traffic route tables of data bag
Each station name and important road sign title containing the traffic route, driver can input day via the keyboard and the display 225
Phase, long-range passenger company coding, bus route numbering and driver's numbering, the tagged items processing system 22 can be via
One reader 221 and wireless frequency identification channel 226 are talked with the electronic tag 3 in the cash certification card, to be got on the bus,
Get off and withhold and system control procedure, in one embodiment, the tagged items processing system 22 is connected via the wireless network
The second wireless channel of device, the wireless channel can be via a WiFi wireless access points and a wireless network linking, to take
The bus is obtained in the station name of station of passage in transit or its numbering or its global geographic location coordinate.In a preferred embodiment,
The radio channel can be to read the station name of station that semi-passive long-distance electronic tag is included via another RFID reader
Or its numbering.All there is a default value to be 0 by Status and LastSID in the financial credit cash certification card, represent that waiting makes
With, when user before the device of tagged items processing system 22 when its cash certification card is shown, the tagged items processing system 22
A present Station XXX (Current Station ID, call CurrentSID in the following text) is obtained via the radio channel, according to multiple
The true and false of the number authentication mode first certification cash certification card and belong to identical systems, then read the Status of the cash certification card
And check Status valuesIf Status=0, program of getting on the bus is carried out, if Status=1, the program of withholing of getting off is carried out, if
Other predetermined values of Status=systems, then be authenticated card includes display Status and certification card remaining sum not using program extremely
Foot, user do not complete program of getting off, user and do not complete program of getting on the bus or enter the messages such as system authentication user's status pattern,
And carry out certification user's status via input Subscriber Number and authentication password, confirming Subscriber Number and authentication password success
Afterwards, a systemic-function must be chosen and perform, the systemic-function includes inputting date and driver's numbering, setting traffic route are compiled
Number, loading traffic route tables of data, loading ride rate carfare tables of data, inquiry traffic route and its by bus rate carfare, read
Take accumulative current collection amount, by pen read gathering record, by pen read CASH ADVANCE record, reset the certification card it
Status and LastSID be 0 make the cash certification card to recover to use, cancel single gathering record, removing single gathering and note down,
Inquire about traffic route station name of station or its code name, inquiry traffic route timetable, inquiry driving station record and tagged items
The selftest (Self-Test) of processing system.Get on the bus program:The tagged items processing system 22 can check CurrentSID=
LastSIDIf equal, the tagged items processing system 22 can show that user has paid, and then terminates communication connection, if not
Equal, then CurrentSID can be stored in LastSID, the long-range passenger company and encode by the bus tagged items processing system 22
It is stored in cash card shop coding 37G and the route number is stored in cash card goods number 37I, tagged items processing
System 22 can be stored in the Status by 1, represent that user has got on the bus, and transmit a transaction news in brief or Email to reception letter
Signal code 370, then terminates communication connection.Get off the program of withholing:2 deposits can be somebody's turn to do by the tagged items processing system 22
Status, indicates entry into the program of withholing and is shown in display 225, the tagged items processing system 22 can read cash card vendor
Shop encodes 37G and cash card goods number 37I, and then Jian Cha ﹝ cash card shops coding 37G=long-range passenger companies are compiled
Ma ﹞ are Ji ﹝ cash card goods numbers 37I=Lu line Bian ﹞If unequal, when representing that user's last time uses the certification card, not
Completion is got off the program of withholing, then the tagged items processing system 22 can show that generation is abnormal, and the certification card can not be used instantly, so
After terminate communication connection, if equal, the tagged items processing system 22 can check CurrentSID=LastSIDIf equal,
Then the tagged items processing system 22 can show that user has got on the bus, and then terminates communication connection, if unequal, represent that user is accurate
Standby to get off, then the tagged items processing system 22 can read Rate, LastSID and Balance of the certification card, and with
Rate, CurrentSID and LastSID obtained carfare Fare from that should ride in rate carfare tables of data, then checked
Balance≧FareIf so, then the tagged items processing system 22 can deduct Fare from the Balance and residue is stored back into this
Balance, CurrentSID is stored in LastSID, and the Status can be stored in by 0, expression be withholdd successfully, in display
225 show and transmit a transaction news in brief or Email to the reception news in brief number 370 and record this collection amount, if
It is not that then Status can be stored in 3 by the tagged items processing system 22, represent that the Balance is not enough, show in display 225,
And this closing balance deficiency record is stored, then the Status can be stored in by 4, indicate entry into a credit card CASH ADVANCE journey
Sequence is simultaneously shown in display 225, is then borrowed a quota cash in advance from the credit card number 376 of the user, is added the quota amount of money
Entering the Balance, shown in display 225, and record the transaction of this CASH ADVANCE is used as the authority for wanting user charges to include biography
Send a transaction news in brief or Email to the reception news in brief number 370, then can be stored in the Status by 2 and again get off withholing
Program, if the Balance is still not enough, the 3 deposit Status being repeated into cash card again, Sorry, your ticket has not enough value and borrowing in advance
Cash program is untill withholing successfully.In a preferred embodiment, when Balance is not enough, the tagged items processing system
22 can also enter a fiscard cash advance program and be shown in display 225, then from the deposit/drawings account number 374 of the user
Pay a quota cash in advance, the quota amount of money is added into the Balance, shown in display 225, and record the pen and pay cash friendship in advance
The authority easily paid in advance as user includes the transaction news in brief of transmission one or Email to the reception news in brief number 370.It is preferable one
In embodiment, in front of the tagged items processing system 22 is detected via the second wireless channel of the wireless network attachment means
There is station name of station or its numbering be next station name of station in its traffic route tables of data or its numbering or important road sign or
During its numbering, close station name of station or road sign title can be reported or shown, and transmit news in brief or Email to one wireless
Radio-frequency discriminating Verification System and radio frequency identification information system, when detect the signal range that departs from current station or road sign or
When person is without passenger getting off car, expected next station name of station can also be reported or shown.In a further preferred embodiment, the label
Item Processing System 22 via the wireless network attachment means can with a wireless network linking, wirelessly by a geographical position
After information and an attendance information are sent to the bus Verification System 2 of the long-range passenger company and public bus information system 1 with work
Continuous processing, the geographical location information may include time, traffic route, car number, driver's numbering, cash certification card card number
And certification unusual condition, global geographic latitude and longitude coordinates, the attendance information includes news in brief, image or news in brief and image, wherein short
News are default presence states or the people's things for sketching scene, and image can be the photo site shot.
Referring to Fig. 3, can be in the cash card balance amount information according to the adjusted parameter word number of tuples of the application 3rd embodiment
378 add a cash card cargo price and a commodity consumption amount of money, and by cash card boarding station numbering 37J as cash card vendor
Product weight is used.In a preferred embodiment, the commodity charging authentication system in a grocery store is by scalable commodity in its shop
Spending amount is converted into according to weight, the commodity charging authentication system in the grocery store uses a RFID tag Item Processing System
22, the RFID tag Item Processing System 22 includes local computer, reader, electronic weighbridge, barcode scanner, Yi Jishou
According to printer, the reader, the electronic weighbridge, the barcode scanner and the receipt printer are respectively provided with USB joint to insert
Enter the USB port of the local computer, the RFID tag Item Processing System 22 also includes the monovalent tables of data of a commodity unit, when
User to the grocery store of family done shopping using a cash certification card when, if user determines 2 kilograms of soya bean of purchase, the grocery clerk
Trade name or code name first are inputted with the barcode scanner, touch screen or numeric keypad, is made at the RFID tag project
The preposition processing of consumption of reason system 22 can obtain the cargo price from the monovalent tables of data of the commodity unit, and salesman uses the electronics again
Platform scale scale obtains the commodity weight, then the RFID tag Item Processing System 22 can by the commodity weight office conversion multiplied by with
Cargo price, so that it may calculate the spending amount of the commodity, after user verification, and in the RFID tag Item Processing System
When showing the cash certification card before 22 devices and checking out, the RFID tag Item Processing System 22 can be according to plural authentication mode certification
The true and false of the cash certification card and belong to identical systems, then carry out the program that cash card is withholdd, update and show that the cash is recognized
The cash card remaining sum 379 of card, records the trade name or code name, commodity weight and the commodity consumption amount of money, and it is stored
To the cash certification card and it is sent to the receipt printer and prints to the user as transaction evidence, also can transmit a transaction
News in brief or Email to the reception news in brief number 370 are used as authority and another authentication mode.
In figure 3, the application sets up a cash card balance amount information 378 in electronic tag 30, the cash card balance amount information 378
Further include the word group set up and there is a cash card remaining sum currency 37F to be one 16, the 0th to the 15th of cash card remaining sum currency 37F the
Position totally 16 can be with cash card remaining sum currency [15:0] represent, the method for setting up cash card remaining sum currency 37F is by the cash
Card remaining sum currency [15:0] 16 classification are such as:Cash card remaining sum currency [15:12] the of cash card remaining sum currency 37F is represented
12 to the 15th totally 4 represent selection currency and exchange the classification of functional check numerals, cash card remaining sum currency [11:8] represent the 8th to
11st totally 4 represent and specify cash card remaining sum storage width and precision form subclassification and cash card remaining sum currency [7:
0] expression the 0th to the 7th represents 3 sub- sorting code numbers such as currency subclassification for totally 8.In a preferred embodiment, the cash card
Remaining sum currency 37F can make following coding:The selection currency exchanges functional check numeral and is categorized as cash card remaining sum currency [15:
12] 4 include 16 kinds of states, to show cash card remaining sum currency 37F use state, for example:0000BRepresentative is not yet opened
Function, 0001 are exchanged with currencyBRepresent not yet selection currency and exchange function, 0010BRepresentative has selected currency to exchange function, 0011B
Represent and specify cash card remaining sum storage width and precision form, 0100BRepresentative completed to enable currency exchange function and
Other values system of representatives blanket insurance continues to employ way, and this specifies cash card remaining sum storage width and precision formatter to be categorized as cash card remaining sum
Currency [11:8] 4 include 16 kinds of forms, for showing floating-point number variable that the cash card remaining sum 379 is one 32, for example:
0000BRepresent specified width, which width 7 and decimal point 0 floating number, 0001BRepresent the floating-point of specified width, which width 7 and decimal point 1
Number, 0010BThe floating number and other values system of representatives blanket insurance for representing specified width, which width 7 and decimal point 2 stay mode, the currency
Subclassification is cash card remaining sum currency [7:0] 8 can be used to represent 256 kinds of national currencies, word or symbol can also be used
Conventional national currency is represented, for example:A represent U.S. dollar, B represent sterling, C on behalf of the people coin, E represent Euro, J represent yen, T
Represent New Taiwan Currency and other values system of representatives blanket insurance stays mode.In a preferred embodiment, user holds a financial credit cash and recognized
When card is consumed, tagged items processing system 22 first the true and false of the certification card and can belong to identical systems, so before withholing
Just check that cash card remaining sum currency 37F selection currency exchanges functional check code afterwards, to confirm that the user has enabled the selection
Currency exchanges function, and reexamining the currency and the currency of cash card remaining sum currency 37F currency subclassification of the spending amount is
It is no identicalIf two kinds of currency are identical, so that it may check that the cash card remaining sum 379 is deducting spending amount Hou≤0If so, just
The spending amount is deducted from the cash card remaining sum 379, is showed if it is not, just borrowing a quota cash in advance from the credit card number and being stored in this
Gold card remaining sum 379, then once withholdd.If two kinds of currency are differed, just perform currency and exchange function program, by consumption gold
Volume is exchanged into the currency of cash card remaining sum currency 37F currency subclassification, then is withholdd, and can thus solve different
Exchange rate transfer problem between currency, such as when New Taiwan Dollar is converted into U.S. dollar, to storage conversion after U.S. dollar may comprising member,
Angle or point, it is rather inconvenient, if therefore the present invention come as global cash certification card in use, advantage is to not only increase system
Anti-fraud system, and the user is not necessary to currency worry again how to store country variant.
Used referring to Fig. 4, it is the application in a financial credit cash certification card (not shown) in its electronic tag 30
Family memory block 3E sets up one the 3rd information table 3E0 schematic diagram.In a preferred embodiment, tagged items processing system 22 is solved
The second encryption key 370 in close UII memory blocks 3D is to obtain the 3rd sub-information 373, and the 3rd sub-information is to be stored in use
The 3rd information table 3E0 length value is block count in the memory block 3E of family.Fig. 4 (a) is referred to, the figure shows the 3rd information table
3E0 is comprising an account transfer account number table 3E1, the account transfer account number 1 [79 that account transfer account number table 3E1 is included:0], account transfer account number 2 [79:0]、
Account transfer account number 3 [79:0], account transfer account number 4 [79:0], account transfer account number 5 [79:0] and account transfer account number 6 [79:0] be all the 0th to
The 79th 5 word group parameters of totally 80.In a preferred embodiment, the 3rd information table 3E0 is still comprising the current control of RFID
Table or receive news in brief directory, or more combination, refer to Fig. 4 (b), the 3rd information table 3E0 is includes account transfer account number table
One of 3E1, RFID current control card 3E2 and reception news in brief directory 3E3 embodiment, the current control card 3E2 of the RFID are included
Control gate inhibition area code [63:0] the reception news in brief number 1 [63 included with reception news in brief directory 3E3:0] and receive news in brief
Number 2 [63:0] it is all the 0th to the 63rd 4 word group parameters of totally 64.In a preferred embodiment, tagged items processing system
22 choose reception news in brief number 1 according to RFID industries subclassification coding or receive news in brief number 2 to transmit financial transaction information
Or other industry information.In one embodiment, as shown in figure 4, the 3rd memory block 3G is equivalent to user memory block 3E, but
3rd memory block 3G does not include the first memory block 36, and the reading memory block RB3 that the 3rd sub-information 373 is indicated does not include simultaneously
First memory block 36.Again in a preferred embodiment, the 3rd information table can be accommodated when UII memory blocks 3D is sufficiently large
During 3E0, the 3rd information table 3E0 can be stored in UII memory blocks 3D without being stored in UM memory blocks 3E.
Referring to Fig. 5, it is close to produce the first encryption when Project Information Table 33 is set up according to the application 3rd embodiment
The schematic diagram that key 352 is decrypted with it.In one embodiment, as shown in Fig. 5 (a), the first encryption key 352 is by label sequence number
313rd, the sub-information 353 of Customs Assigned Number 355 and second produces to encrypt, and first encryption key 352 can be with 3 word group tables
Show such as the first encryption key [47:32], the first encryption key [31:16] and the first encryption key [15:0], or with one 48
Represent such as the first encryption key [47:0].The cryptographic calculation of first encryption key 352 can be the arithmetic of addition and subtraction or patrol
Computing is collected, Fig. 5 (a) is an embodiment of add operation.In Fig. 5 (a), label sequence number 313 passes through addition with Customs Assigned Number 355
Computing obtains the first result, and first result obtains the first encryption key with the second sub-information 353 after add operation again
352.In a preferred embodiment, the first encryption key 352 can be believed by the sub-information 353 of label sequence number 313 and second or the second son
The multiple of breath 353 is produced encrypting.Again in a preferred embodiment, the first last encryption key 352 can be transported from the encryption
Calculate result and capture 1 word group such as the first encryption key [15:, or 2 word groups such as the first encryption key [31 0]:16] and first plus
Key [15:0].As shown in Fig. 5 (b), the second sub-information 353 is by the first encryption key 352, label sequence number 313, Yi Jiyong
Family numbering 355 obtains to decrypt.The decryption computing of second sub-information 353 can be as shown in Fig. 5 (b).In Fig. 5 (b), first adds
Key 352 and label sequence number 313 obtain the second result via subtraction, second result again with Customs Assigned Number 355 via
The second sub-information 353 is obtained after subtraction.
Referring to Fig. 6, it, which is the application, produces the second encryption key 370 and its decryption schematic diagram.In one embodiment,
As shown in Fig. 6 (a), the second encryption key 370 is encrypted by label sequence number 313 and the 3rd sub-information 373 and obtained, wherein the 3rd
Sub-information 373 also can be its multiple, and second encryption key 370 can be represented such as the second encryption key [47 with 3 word groups:32]、
Second encryption key [31:16] and the second encryption key [15:0], or with one 48 represent such as the second encryption key [47:
0].The cryptographic calculation of second encryption key 370 can be arithmetic or the logical operation of addition and subtraction, and Fig. 6 (a) is add operation
An embodiment.In Fig. 6 (a), the sub-information 373 of label sequence number 313 and the 3rd obtains second after add operation and added
Key 370.In a preferred embodiment, the second encryption key 370 can be exactly the 3rd sub-information 373 or its multiple to encrypt
And produce.Again in a preferred embodiment, the second last encryption key 370 can capture 1 from the cryptographic calculation result
Word group such as the second encryption key [15:, or 2 word groups such as the second encryption key [31 0]:16] and the second encryption key [15:0].
In Fig. 6 (b), the second encryption key 370 and label sequence number 313 after subtraction inverse operation via obtaining the 3rd sub-information 373.
Referring to Fig. 7, it is to be built according to the application 3rd embodiment in an electronic tag 30 in reserved memory block 3B
Project verification mesh is destroyed password 3B1 and project and accessed to your password 3B2 method schematic diagram.Reserved memory block 3B is the internal memory of one 64
Space, the memory headroom, which stores a project, to be destroyed password 3B1 and a project and accesses to your password 3B2, and this two groups of passwords are all two words
The parameter of group, must all be set up, in one embodiment, this two groups of passwords can be from the electronics in advance before using electronic tag 3
The label identifier 31 of label 30 captures two of which word group to set up.In a preferred embodiment, the project destroys password 3B1
And the project 3B2 that accesses to your password can be produced from the label sequence number 313 of the label identifier 31 through Hash operation.In the figure 7, first
Password shielding 2271 is one 3 word group constants, and label sequence number 313 is one 3 word group parameters, its 0th to the 47th totally 48 can be with
TagSN[47:0] represent, be to shield in 48 of 2271 to have the position for being set as 1 according to the first password with the computing of door 227, from
TagSN[47:0] corresponding position is captured in 48 as the output signal with door 227.In one embodiment, the application mark
Sign Item Processing System 22 and set the first password masking value that first password shielding 2271 is one 48, its value is
000000000001H, the label sequence number 313 shields 2271 processes and the computing of door 227 with the first password, only from the label sequence number
313 acquisitions correspond to the second password masking value and are set as that 1 the 0th TagSN [0] is used as follow-up control signal, to input
To one 1 encoders 228.In a preferred embodiment, the 1 of first password shielding 2271 the 0th can will be set in be set in
Other positions of first password shielding 2271, the tagged items processing system 22 can capture any from the label sequence number 313
Position is used as the control signal of 1 encoder 228.The encoder 228 has two output signals and is connected to a Hash table
(Hash Table) 229, the Hash table 229 has two groups of password setting values.In one embodiment, it is that may be selected according to TagSN [0]
The output signal of the Hash table 229 is set as first group of password 2291 or second group of password 2292, when TagSN [0] is 0,
The Hash table 229 exports first group of password 2291, and it is 00010000 to obtain first item and destroy password 3B11HDeposited with first item
It is 00000001 to take password 3B21H, and when TagSN [0] is 1, the Hash table 229 exports second group of password 2292, obtains the
It is 00100000 that two projects, which destroy password 3B12,H3B22 is accessed to your password for 00000010 with second itemH.In a preferred embodiment
In, the first password shielding 2271 can set any P certain bits as have 1 other values, can be from label sequence with door computing
Numbers 313 capture any P certain bits as control signal subsequently, to input to a N encoder, and the N encoder can be with
Output 2NGroup password setting value, to produce corresponding 2NGroup project is destroyed password 3B1 and project and accessed to your password 3B2.
Referring to Fig. 8, it is to set up one second in an electronic tag UII memory blocks according to the application 3rd embodiment to believe
Breath table simultaneously makes it have the different method schematic diagrams put in order.Please refer to Fig. 3, the figure shows that the application sets up a finance letter
A Project Information Table 33 of certification card in cash, wherein being stored in memory address 480H~5FFHFor the second information table 39, this second
Information table 39 include deposit/drawings account number 374, credit card number 376, credit clip pin 37A, face cabinet password 377, compare failure time
The parameters, second information table such as number 37E, deposit/drawings password 375, the second encryption key 370 and cash card balance amount information 378
The storage address of each parameter is original alignment order in 39.In a preferred embodiment, each parameter in second information table 39
Storage address can have what is differed to put in order, and the length of the second information table 39 can seem gold according to different certification card systems
Melt cash certification card system, credit cash certification card system and cash certification card system and change, in order to avoid second information table
Cash card remaining sum 379 is by illegal wiretapping in 39 and alters.In fig. 8, the second password shielding 22A1 has 48 for one by default
Position 3 word group constants, label sequence number 313 be one 3 word group parameters its 0th to the 47th totally 48 can be with TagSN [47:0] table
Show, be to shield in 48 of 22A1 to have the position for being set as 1 according to second password with door 22A computings, from TagSN [47:0] 48
Corresponding position is captured as the output signal with door 22A in position, and the tagged items processing system 22 is setting up the project information
After table 33, shield 22A1 to produce k kinds with not according to the label sequence number 313, the password of the second information table 39 and second
With the second information table 39 put in order1,392,393…,39k, wherein k is any numeral between 1 to 16.In an embodiment
In, the storage address of each parameter is an original alignment in second information table 39, the memory address pointer of the original alignment for [n,
N+1 ..., n+m], wherein n is the storage address that an address pointer indicates 39 first parameters of the second information table, and m+1 is arrangement
Adjusting range indicates the number of parameters of second information table 39, and the unit length of parameter can be the word group of one 16, and works as and be somebody's turn to do
Second information table 391Address pointer be [n+1, n+2 ..., n+m, n], it represents the storage address of each parameter in the table to the right
It has rotated the unit length of a parameter.
In fig. 8, the application tagged items processing system 22 set second password shield 22A1 as one 48 second
Password masking value, its value is 00000000000FH, the label sequence number 313 is passed through with second password shielding 22A1 transports with door 22A
Calculate, only captured from the label sequence number 313 and correspond to the second password masking value and be set as the 0th to the 3rd of 1 TagSN of totally 4
[3:0] as follow-up control signal, to input to one 4 encoder 22B.In a preferred embodiment, this will can be set in
Second password shielding 22A1 the 0th to the 3rd 1 is set in second password shielding other 4 of 22A1, the tag entry for totally 4
Mesh processing system 22 can capture any 4 conducts, 4 encoder 22B control signal from the label sequence number 313.The coding
Device 22B has 16 output signals, is connected to an adjustment table (Adjust Table) 22C for its input signal, adjustment table 22C
Each input signal have one group of corresponding arrangement adjustment computing, adjustment table 22C is up to 16 groups of arrangements adjustment computings,
Arrangement adjustment computing includes arithmetic, logic and the shift operation method of address pointer, makees data in second tables of data
To anticlockwise, to right rotation, exchange computing or move to different memory sections or block, for the tagged items processing system
Parameters put in order in 22 adjustment second information tables 39, and each label sequence number 313 can take from adjustment table 22C
Obtain one group of arrangement adjustment operation method.In a further preferred embodiment, the tagged items processing system 22 by encoder 22B simultaneously
Enter adjustment table 22C, second password shields 22A1 and one group of N number of conduct adjustment table is arbitrarily captured from the label sequence number 313
22C N number of adjustment control signal, adjustment table 22C contains up to 2NPlant arrangement adjustment operation method.
Please refer to Fig. 3 and Fig. 8, according to the application 3rd embodiment to illustrate specific embodiment.Implement one
In example, the application is when a Project Information Table is set up, and tagged items processing system 22 sets the value that second password shields 22A1
For 00000000000FH, the label sequence number 313 and second password shielding 22A1 pass through with door 22A computings, only from the label sequence
Numbers 313 capture and correspond to the TagSN [3 that the second password masking value is set as 1:0] as follow-up 4 encoder 22C control
Signal.In one embodiment, as TagSN [3:0] it is 0HWhen, tagged items processing system 22 will choose the from adjustment table 22C
One group of arrangement adjusts computing 22C1 to produce second information table 39 with first group of arrangement1.In a preferred embodiment, the group
Arrangement adjustment computing 22C1 is that the storage address of each parameter in the second information table 39 is rotated to the right into (Rotate Right) two
The original alignment of each parameter is illustrated in figure 3 in word group, second information table 39:Cash card remaining sum [31:16], cash card remaining sum
[15:0] ..., deposit/drawings account number [31:16] and deposit/drawings account number [15:0], the storage address of each parameter can be as:
480H、490H、…、5E0HAnd 5F0HRepresent, the storage address of each parameter is moving to right two word groups in second information table 39
Afterwards can be as:4A0H、4B0H... and 490HRepresent, then the deposit/drawings account number [31:16] it is stored in memory address 480H,
The deposit/drawings account number [15:0] it is stored in memory address 490H, this creates the terminal the second information table with first group of arrangement
391.In a further preferred embodiment, the arrangement adjustment operation method in adjustment table 22C can include moving to left or only to the left
Or to right rotation 1 or other or 0 character, other logical operations can also be included or any computing is not done, or even including with
Character or digit adjust putting in order for each parameter.In a further preferred embodiment, as TagSN [3:0] it is 1HWhen, tag entry
Mesh processing system 22, which will choose second group of arrangement from adjustment table 22C and adjust computing 22C2 to produce, has the of second group of arrangement
Two information tables 392, group arrangement adjustment computing 22C2 is to rotate the storage address of each parameter in the second information table 39 to the left
The storage address of each parameter is by from original row as shown in Figure 3 in (Rotate Left) two word groups, second information table 39
Row, can be as after two word groups are moved to left:5E0H、5F0H... and 5D0HRepresent, then the cash card use state [15:0]
It is stored in memory address 480H, cash card boarding station numbering [15:0] it is stored in memory address 490H, this creates the terminal with
Second information table 39 of second group of arrangement2.In a further preferred embodiment, the arrangement adjustment computing included by adjustment table 22C
Method can be leftward or rightward mobile 1 or the computing or other logical operations of other or 0 block, such as by portion
Point parameter makees Swap and exchanges computing or Bit Reversal bit reversal computings etc..Again in a preferred embodiment, second password
Shielding 22A1 can be other values, and tagged items processing system 22 can be from the label sequence number 313 arbitrarily acquisition 1~N number of position
Adjustment table 22C adjustment control signal, makes adjustment table 22C include 21~2NGroup arrangement adjustment operation method.It is again preferable one
In embodiment, the internal memory of the electronic tag can be distinguished according to section and block, and adjustment table 22C contains up to 2NPlant and adjust the ground
Arithmetic, logic and the shift operation method of location pointer, it includes making the data of the tables of data to make in a block to left-handed
Turn, to right rotation, exchange computing or move to different memory blocks or section.
1st group of arrangement adjustment computing 22C1 in Fig. 8, the 2nd group of arrangement adjustment computing 22C2 ... and the 16th group of arrangement is adjusted
Whole computing 22C3 still has different storages rules, for example by the cash card remaining sum in the second information table 39, cash card use state,
Cash card boarding station numbering, cash card shop coding, cash card goods number ... deposit/drawings account number first according in strange digit groups
Deposit address (480H~48FH、4A0H~4AFH、4C0H~4CFH、…5E0H~5EFH) ordered storage, then according to even digit groups
Memory address (490H~49FH、4B0H~4BFH、4D0H~4CDH、…5F0H~5FFH) ordered storage.
Know referring to Fig. 9, it is the application RFID tag Item Processing System (RFID TIPS) 22 for a less radio-frequency
Other information system (RFID IS) 1 is the method schematic diagram that user sets up a Project Information Table in an electronic tag 3.Please join simultaneously
Fig. 3 and Fig. 5 are read to Fig. 9, the RFID IS 1 include a radio frequency identification Verification System (RFID AS) 2 and an electronic tag 3,
The electronic tag 3 has a label identifier 31 and a tag memory 34, and the tag memory 34 can come according to memory sections and block
Distinguish, the RFID AS 2 include a RFID TIPS 22, the RFID TIPS 22 configure an electronic tag in its working memory
Data structure T30 and one group of system constants, this group of system constants include first password shield the 2271, second password shielding 22A1,
First information table length value, the second information table length value, the 3rd information table length value, Hash table 229 and adjustment table 22C, should
Electronic tag data structure T30 includes RM blocks 3B, TID field block 3C, UII block 3D and UM block 3E, UII blocks 3D
Including the first memory block 36 and the second memory block 38, UM blocks 3E can be the 3rd memory block 3G, TID field block 3C
Comprising a label identifier 31, the label identifier 31 includes label sequence number 313 and manufacturer's numbering 314, the electronic tag number
A Project Information Table 33 is stored according to structure T30, the Project Information Table 33 includes first information table 35, the second information table the 37, the 3rd
Information table 3E0, project are destroyed password 3B1 and project and accessed to your password 3B2, and first memory block 36 stores first letter
Table 35 is ceased, second memory block 38 stores second information table 37, and UM blocks 3E stores the 3rd information table 3E0,
The first information table 35 includes the first authentication information 350, the first encryption key 352 and the first other information 354, and this first
Authentication information 350 includes project code 357, Customs Assigned Number 355, and first encryption key 352 includes the second sub-information of encryption
353, first other information 354 includes the PC information 351 of bullets 358 and the first, and second information table 37 is recognized comprising second
Information 371, the second encryption key 370 and the second other information 372 are demonstrate,proved, second authentication information 371 includes deposit/drawings password
375th, face cabinet password 377, cash card remaining sum 379 and credit clip pin 37A, second encryption key 370 comprising encryption the
Three sub-informations 373, second other information 372 includes deposit/drawings account number 374, credit card number 376 and cash card balance amount information
378, the wherein project code 357 enables function son point including RFID industries subclassification, RFID device subclassification, RFID selections
Class, RFID functions subclassification and RFID implement the coding of national subclassification, and the bullets includes being directed to a project code
357 RFID industries subclassification is numbered according to its tissue, and the 3rd information table 3E0 includes an account transfer account number table 3E1, one
In preferred embodiment, the 3rd information table 3E0 comprising RFID pass through control card 3E2 or receive news in brief directory 3E3, or more
Combination, this method comprises the steps of, step S200:In the working memory of the RFID tag Item Processing System 22, configuration
One electronic tag data structure T30, initializes the electronic tag data structure T30 and one group of system constant value, and system system is normal
Numerical value includes each parameter in a Project Information Table 33 and the Project Information Table 33, project destruction password 3B1 and the project and deposited
Password 3B2 is taken, the Project Information Table 33 includes the first information table 35, the information table of the second information table 37 and the 3rd
3E0.Step S201:Read the label identifier 31 of the electronic tag 30 and be stored in electronic tag data structure T30 mark
Identifier 31 is signed, the label identifier 31 includes a label sequence number 313 and manufacturer's numbering 314.Step S202:Foundation should
RFID industries subclassification, the RFID device subclassification, the RFID selection enable function subclassification, the RFID functions subclassification, with
And it is that the user is encoded that the RFID, which implements national subclassification, to produce the project code 357.Step S203:Foundation should
The tissue subclassification of RFID industry subclassifications is that the user is numbered, to produce the bullets 358 and the Customs Assigned Number
355.Step S204:It is encrypted according to the Customs Assigned Number 355, the label sequence number 313 and second sub-information 353, to produce
Raw first encryption key 352, second sub-information 353 is the second information table length value, in a preferred embodiment, and this
Two information table length values are 24.Step S205:Set the first PC information 351 and include a system initial value, it is first letter
Table length value is ceased, in a preferred embodiment, the first information table length value is 7.Step S206:Obtain second information table 37
Middle parameters value or its preset value include deposit/drawings account number 374 and credit card number 376, also including obtaining the second authentication information
371 each authentication password value or its preset value include the deposit/drawings password 375 being used on aATM, credit clip pin 37A, with
And be used in that bank faces cabinet face cabinet password 377.Step S207:Carried out according to the sub-information 373 of label sequence number 313 and the 3rd
Encryption, to produce second encryption key 370, the 3rd sub-information 373 is the 3rd information table length value, is preferably implemented one
In example, second encryption key 370 can be substituted with a reception news in brief number 370.Step S208:According to the label sequence number 313, it is somebody's turn to do
First password the shielding 2271 and Hash table 229, generation project destroys password 3B1 and project accesses to your password 3B2.Step
S209:One group of arrangement adjustment fortune is obtained according to the label sequence number 313, second password shielding 22A1 and adjustment table 22C
Calculate, to adjust each argument address in second information table 39, produce the second information table 39 with different arrangementsN.Step S210:
Each parameter value in the 3rd information table 3E0 is obtained, each parameter is comprising an account transfer account number table 3E1 or its predetermined value is obtained, one
In preferred embodiment, to obtain the current control card 3E2 of RFID or being 00000000 with default valueHReception news in brief directory
3E3, or more combination.Step S211:Electronic tag data structure T30 is stored to the electronic tag 30, the electronics mark
Signing data structure T30 includes the first information table 35, second information table 37, the 3rd information table 3E0, project destruction password
3B1 and the project access to your password 3B2.
Referring to Fig. 10, it is according to the RFID tag Item Processing System (RFID of the 4th preferred embodiment of the application one
TIPS) 22 are used for a radio frequency identification information system (RFID IS) 1 using encryption key and password with the electronic tag of certification one
3 method schematic diagram.Please refer to Fig. 3, Fig. 5 to Fig. 8 and Figure 10, the RFID IS 1 recognize comprising a radio frequency identification
Card system (RFID AS) 2 and an electronic tag 3, the electronic tag 3 have a label identifier 31 and a tag memory, the mark
Label internal memory is distinguished according to memory sections and block, and the RFID AS 2 include a RFID TIPS 22, and the RFID TIPS 22 are included
One group of system constant value, this group of system constant value includes first password and shields the 2271, second password shielding 22A1, first information table
Length value, the second information table length value and adjustment table 22C, this method include step S301 as shown in Figure 10:The RFID
TIPS 22 sets up a Project Information Table 33 in the electronic tag 3 according to plural authentication phase, and the Project Information Table 33 includes first
Information table 35, the second information table 39NAnd the 3rd information table 3E0, the wherein first information table 35 includes the first authentication information
350th, the first encryption key 352 and the first other information 354, first authentication information 350 is comprising project code 357 with using
Family numbering 355, first other information 354 includes bullets 358 and the first PC information 351, the wherein project code 357
Sorting code number includes RFID industries subclassification, RFID device subclassification, RFID and selects to enable function subclassification, RFID functions son point
Class and RFID implement national subclassification, second information table 39NIncluding the second authentication information 371, the second encryption key 370,
And second other information 372, second authentication information 371 comprising deposit/drawings password 375, face cabinet password 377, cash card remaining sum
379 and credit clip pin 37A.Step S302:Choosing and check the electronic tag 3 according to the project code 357 includes this
The RFID industries subclassification of mesh coding 357, RFID device subclassification, RFID selections enable function subclassification, RFID functions son point
Class and RFID implement national subclassification.Step S303:Read the first information table 35.Step S304:Examine the first information
The block count of table is the first information table length value.Step S305:The label identifier 31 is read, the label identifier 31 is included
The one manufacturer's numbering 314 of label sequence number 313 and one.Step S306:Solved using the label sequence number 313 with the Customs Assigned Number 355
Close first encryption key 352 is to obtain second sub-information 353.Step S307:Examine second sub-information 353 for this second
Information table length value is with the true and false of the certification electronic tag 3 and confirms to belong to identical systems with the electronic tag 3.Step S308:
Second information table 39 is read according to second sub-information 353N.Step S309:Utilize the label sequence number 313, second password
Shield 22A1 and adjustment table 22C and obtain one group of adjustment computing, there is original to obtain through inverse adjustment (Unadjust) computing
Begin the second information table 37 arranged.Step S310:Certification second authentication information 371 is with use second other information 372.Step
Rapid S311:Second encryption key 370 is decrypted to obtain the 3rd sub-information 373 using the label sequence number 313, indicates the 3rd letter
Breath table 3E1 length value is block count, in a preferred embodiment, and second encryption key 370 receives news in brief number 370 by one
Substitute, the 3rd sub-information 373 is then a systemic presupposition value.Step S312:The sub-information 373 of certification the 3rd is to read and use
3rd information table 3E0, in a preferred embodiment, then to read and using the 3rd information table 3E0.
Figure 11 is referred to, it is that the preferred embodiment RFID tag Item Processing System of the application the 5th uses a plural certification
The method first stage changes over time schematic diagram with the message of the electronic tag of certification one, and the figure is that user holds a financial credit cash
Certification is stuck in the embodiment that bank handles deposit/drawings business, and a bank cashier, which has been turned on a local computer 222, includes access originally
Ground computer network environment, one group of system constants of setting RFID environment and setting, this group of system constants include computer type
CompType is set as " facing cabinet service computer ", first information table length value, the second information table length value, the comparison frequency of failure
Maximum, Hash table 229 and adjustment table 22C, the bank cashier also have been turned on the RFID TIPS 22.Please refer to figure
1st, Fig. 3 and Figure 11, this method includes step S501:User shows an electronic tag 3.Step S502:The RFID TIPS 22
Start the reader 221, and enabled according to RFID industries subclassification, RFID device subclassification, the RFID selection of project code 357
Function subclassification and RFID functions subclassification choose an electronic tag through the reader 221 with Select instructions, implement one
In example, the condition for meeting selection is the financial credit cash certification card of the superfrequency long range of financial circles, in a preferred embodiment
In, the RFID industries subclassification of the project code 357, RFID device subclassification, RFID selections enable function subclassification and
RFID functions subclassification can also Select instructions choose electronic tag for other field, and the condition for meeting selection is door
Prohibit the short-range financial credit cash certification card of high frequency of industry.Step S503:The RFID TIPS 22 are clear with Inventory instructions
Look into electronic tag.Step S504:In one embodiment, the reader 221 is instructed with Query and checks the electronic tag containing superfrequency
Card-type device, in a preferred embodiment, the reader 221 check the card containing ultra high frequency IC tag with BeginRound instructions
Device.Step S505:In one embodiment, the reader 221 with QueryRep instruction require query report length containing superfrequency away from
From the device of electronic tag, in a preferred embodiment, the reader 221 requires that query report contains high frequency with NewSlot instructions
The device of short-distance electronic tag.Step 506:In one embodiment, the electronic tag 3 for meeting the condition of being selected passes an inspection back
Look into yard RN1 to be received by the RFID TIPS 22 through the reader 221, check code RN1 is the random code RN16 of one 161,
In one preferred embodiment, check code RN1 is 16 error detecting code StoredCRC for being stored in the electronic tag.Step 507:
The RFID TIPS 22 enclose check code RN1 to read the data of the electronic tag 3.Step S508:The reader 221 is with this
The check code RN1 received replys the electronic tag 3.
Step S509:In the electronic tag 3 is indicated after check code RN1 is acknowledged receipt of, according to the first PC information 351
Block RB1 is deposited, the first information table 35 is passed back and is received through reader 221 by the RFID TIPS 22, the first information table 35 is wrapped
Detectd containing project code 357, bullets 358, Customs Assigned Number 355, the first encryption key 352, the first PC information 351 and CRC
Error code.Step S510:The RFID TIPS 22 verify block count=" first information table length value " of the first information table 35
In a preferred embodiment, the first information table length value is 7, if unequal, represents that occurring unusual condition then enters step
S512.If equal, expression is verified and enters step S511:The project of the RFID TIPS 22 checking first information table 35
Coding 357, bullets 358 and Customs Assigned Number 355, to confirm that the electronic tag 3 belongs to identical with the RFID TIPS 22
System, if not verified, enters step S512 to terminate communication session.If by checking, continuing such as the step of Figure 12
S516 authentication method.Step S512:The RFID TIPS 22 terminate the communication session with the electronic tag.Step S513:Read
Device 221 is taken to continue to choose next electronic tag.Step S514:The RFID TIPS 22 cut off the communication with the reader 221
It is online.Step S515:The reader 221 cuts off radio frequency power supply.
Figure 12 is referred to, it is that the application RFID tag Item Processing System 22 uses a plural authentication method second stage
Schematic diagram is changed over time with the message of the electronic tag of certification one, the continuity that the figure is Figure 11.Please refer to Fig. 1 to Fig. 3, figure
11 and Figure 12, this method comprises the steps of S516:The RFID TIPS 22 require that user is inputted using numeric keypad 223
One authentication password, this is the certification of the second authentication information 371.Step S517:Now bank cashier, which can ask user to show, user
The certificate of customer identification symbol is for follow-up comparison, while require that user inputs an authentication password using numeric keypad 223, for
User's status of the electronic tag is shown in inspection.Step S518:The RFID TIPS 22 send Read instructions to read the mark
Sign identifier 31.Step S519:The reader 221 encloses check code RN1 with Req_RN instructions and requires one to the electronic tag 3
New random code.Step S520:The electronic tag 3 is returned to the reader 221 1 random after handle RN1 is acknowledged receipt of
Code RN2, as the handle of subsequent communications, random code RN2 is the random code RN16 of one 162, and by the RFID TIPS 22
Receive.Step S521:The reader 221 encloses handle RN2 to read the label identifier 31 of the electronic tag 3.Step
S522:The electronic tag 3 encloses handle RN2 after handle RN2 is acknowledged receipt of, by the label identifier 31 and is returned to reading
Device 221 is write, and is received by the RFID TIPS 22, the label identifier 31 is numbered comprising a label sequence number 313 and a manufacturer.
Step S523:The RFID TIPS 22 decrypt first encryption key 352 using label sequence number 313 and the Customs Assigned Number 355, with
Second sub-information 353 is obtained, second sub-information 353 is that the length value of the second information table 37 is block count.Step S524:Inspection
Test " second sub-information 353 "=" the second information table length value "If unequal, then carry out step S532 to terminate with being somebody's turn to do
The communication session of electronic tag 3.If equal, then step S525 is carried out:The RFID TIPS 22 enclose this through the reader 221
Handle RN2 is according to second sub-information 353 to read second information table 39 of the electronic tag 3N.Step S526:The electronics
Label 3 is after handle RN2 is acknowledged receipt of, by the second information table 39 in second memory block 38NEnclose handle RN2 biographies
It is back to reader 221.Step S527:Receive second information table 39N, second information table 39NSystem is by one group of row in Fig. 8
Produced by row adjustment computing.Step S528:The RFID TIPS 22 using the label sequence number 313, the second password shielding 22A1, with
And adjustment table 22C obtains one group of arrangement adjustment computing, to second information table 39NImposing inverse arrangement adjustment computing can obtain
One has the second information table 39 of original alignment order, and second information table 39 includes the second encryption key 370 and the second certification
Information 371, second authentication information 371 includes deposit/drawings password 375, faces cabinet password 377, cash card remaining sum 379 and credit
Clip pin 37A.Step S529:Certification letter is chosen from second authentication information 371 according to the computer kenel CompType
Breath, the CompType can be aATM, face cabinet service computer, work station or wisdom cashing machine, in one embodiment, should
CompType has been set to " facing cabinet service computer " in the application, then according to the CompType local computers can from this second
This is selected in authentication information 371 and faces cabinet password 377 for the authentication information, is then compared " authentication information "=" user's input
Authentication password "If differing, then into step S536.If identical, then step S530 is carried out:The RFID TIPS 22 are
It can be used the second information table 39 for receiving, second information table 39 equivalent to being stored in tag memory address 480 in figure 3HExtremely
5FFHInformation.For example, in one embodiment, the RFID TIPS 22 are using the deposit/drawings account number 374 in Fig. 3 through network connection
Device 5 and internet 6 set up online with a shared database 4, and empirical tests its be database user, just can be from the database
4 read the deposit/drawings account number 374 user data, for example status identification code, name in an account book, the birthday, address, programmed emergency and
The information such as phone, so that bank cashier confirms to show user's status of the electronic tag a little earlier.Step S531:In the user
After status confirms, bank cashier can just carry out deposit subsequently or withdraw deposit or transfer transactions, and the RFID TIPS 22 are in transaction
After the completion of the transaction can be stored in database 4, then carry out step S532:Terminate the communication session with the electronic tag 3.
Step S533:Reader 221 continues to choose next electronic tag.Step S534:The RFID TIPS 22 are cut off and reader
221 communication connection.Step S535:The reader 221 cuts off RF power supplys.Step S536:Examine " comparison frequency of failure 37E ”≤
" comparing frequency of failure maximum "If so, then carrying out step S539:Start the processing routine for destroying label, in order to avoid by external
Intelligent intrusion system, then carries out step S532.If it is not, then carrying out step S537:Frequency of failure 37E increases will be compared
The result of 1 time is stored in a buffer Areg.Step S538:Handle RN2 is enclosed via reader 221, using from step
The group arrangement adjustment computing of S528 acquirements is lost with obtaining the address pointer after comparison frequency of failure 37E adjustment in the comparison
Lose number of times 37E adjustment after address pointer by the comparison frequency of failure 37E of the electronic tag 3 be updated to buffer Areg it
Numerical value, then carries out step S532 to terminate the communication session with the electronic tag 3.
Figure 13 is referred to, it is the preferred embodiment RFID tag Item Processing System 22 of the application the 6th in toll is paid
Schematic diagram is changed over time using the message of a plural authentication method.In one embodiment, user recognizes a financial credit cash
Card hangs in vehicle or is placed in the insertion groove being attached on vehicle that its charging administration system shows by a track
The embodiment that gold is withholdd, a Lane regulation person, which has been turned on a local computer 222, to be included access local computer network environment, sets
Determine one group of system constants of RFID environment and setting, it is " intelligence that this group of system constants, which include setting computer Type C ompType,
Cashing machine ", first information table length value, the second information table length value, comparison frequency of failure maximum, Hash table 229 and tune
Whole table 22C, the Lane regulation person also has been turned on the RFID TIPS 22.As shown in figure 13, the step S601 of this method:User goes out
Show a financial cash certification card, this shows mode and includes the card is hung in its vehicle or is placed in being attached on vehicle
In one insertion groove, card is faced vehicle heading and be fixed on the insertion groove that can make 45 ° of left rotation and right rotation or adjust upward 45 °
In, for RFID TIPS 22 and card foundation communication.Step S602:RFID TIPS 22 start reader 221 and according to item
The RFID industries subclassification of mesh coding 357, RFID device subclassification, RFID selections enable function subclassification and RFID functions
Subclassification, in one embodiment, the condition that an electronic tag is chosen in setting are the financial credits of the superfrequency long range of financial circles
Cash certification card, in a preferred embodiment, RFID industries subclassification, RFID device subclassification, the RFID of the project code 357
Selection enables function subclassification and RFID functions subclassification can be that the financial credit cash of high frequency short distance of gate inhibition's industry is recognized
Card.Step S603:Reader 221 sends the condition for choosing electronic tag 3.Step S604:RFID TIPS 22 are via reading
Device 221 checks electronic tag.Step S605:Reader 221 sends query report instruction.Step S606:Meet the condition of being selected
Electronic tag pass a check code RN3 back, received through reader 221 by RFID TIPS 22, check code RN3 can be 1
The random code RN16 of position3.Step S607:The RFID TIPS 22 enclose check code RN3 through the reader 221 and reply electronics mark
Label 3, to read the information of the electronic tag 3.
Step S608:The electronic tag 3 indicates RB1 after check code RN3 is confirmed according to the first PC information 351
The first information table 35 in the first memory block 36 is transmitted, is received through reader 221 by the RFID TIPS 22, first letter
Cease table 35 and include project code 357, Customs Assigned Number 355, the first PC information 351 and the first encryption key 352.Step S609:
The RFID TIPS 22 examine the block count of the first information table 35 to be the first information table length value, in a preferred embodiment
In, the first information table length value is 7, if unequal represent occur unusual condition, into step S624.If equal, then
Into step S610:The RFID TIPS 22 send the instruction for reading label identifier 31.Step S611:Reader 221 with
Req_RN instructions enclose check code RN3 and require a new random code to electronic tag 31.Step S612:The electronic tag 3 exists
Confirm after check code RN3, pass a new random code RN4 back, as the handle of subsequent communications, through the reader 221 by this
RFID TIPS 22 are received, and the handle can be the random code RN16 of one 164.Step S613:Reader 221 encloses the handle
RN4 is to read the label identifier 31 of the electronic tag 3.Step S614:The electronic tag 3 is passed after handle RN4 is confirmed
Give the label identifier 31 to enclose check code RN3, received through reader 221 by the RFID TIPS 22, the label identifier
31 include a label sequence number 313 and manufacturer's numbering 314.
Step S615:The RFID TIPS 22 decrypt first encryption using the label sequence number 313 and the Customs Assigned Number 355
Key 352, if second sub-information 353 is identical with the second information table length value, is confirmed with obtaining one second sub-information 353
The electronic tag 3 being selected is not to forge, and belongs to identical systems with the RFID TIPS 22.
Step S616:The RFID TIPS 22 enclose handle RN4 according to second sub-information 353 through the reader 221
To read the second information table 39 of the electronic tag 3N.Step S617:The electronic tag 3 is after handle RN4 is confirmed, by this
Second information table 39NEnclose handle RN4 and pass back and received through the reader 221 by the RFID TIPS 22, second information table
39NSystem is by produced by one group of adjustment arrangement computing in Fig. 8.
Step S618:RFID TIPS 22 using the label sequence number 313, second password of default value shielding 22A1,
And adjustment table 22C obtains one group of arrangement adjustment computing, to second information table 39NImposing inverse arrangement adjustment computing can obtain
There must be the second information table 39 of original alignment order, second information table 39 includes the second encryption key 370 and the second certification
Information 371, second authentication information 371 includes a cash card remaining sum 379.Step S619:The RFID TIPS 22 are first by cash
Spending amount deducts from the cash card remaining sum 379 and obtains one " the cash card remaining sum after withholing ", then examines " showing after withholing
Gold card remaining sum ”≤0If it is not, then carrying out step S628.If so, then carrying out step S620 when the password that compares is successful:Should
RFID TIPS 22 enclose handle RN4 via reader 221, using from the groups of step S618 acquirements arrangement adjustment computing with
The address pointer after the cash card remaining sum 379 adjustment is obtained, and in the address pointer after the cash card remaining sum 379 adjustment by the electricity
Cash card balance updates in subtab 3 are the cash card remaining sum after withholing.Step S621:The electronic tag 3 is confirming to be somebody's turn to do
It is the cash card remaining sum after withholing that the cash card remaining sum 379 is updated after handle RN4, and handle RN4 is transmitted after success to reading
Take device 221.Step S622:The reader 221 has been successfully updated the cash card remaining sum 379.Step S623:The RFID TIPS 22
Store the transaction and include the transaction news in brief of transmission one or Email extremely in database 4 and the processing program bag performed after withholing successfully
The reception news in brief number 370 is as authority, and in one embodiment, RFID automation Lane regulations system can be opened in long range
A fence is opened, and shows or sends current message in real time, in a preferred embodiment, RFID automation power-supply management systems
A game machine can be started in short distance.Step S624:The RFID TIPS 22 terminate the communication session with the electronic tag 3.
Step S625:Reader 221 chooses next electronic tag.Step S626:The RFID TIPS 22 are cut off and reader 221
It is online.Step S627:The reader 221 cuts off RF power supplys.Step S628:The RFID TIPS 22 are shown on display 225
The cash card remaining sum 379 is not enough.Step S629:The RFID TIPS 22 store the transaction in database 4 and perform mistake of withholing
Processing routine after losing, in one embodiment, cash card can be shown or send in real time in RFID automations Lane regulation system
The message that Sorry, your ticket has not enough value, in a preferred embodiment, an automatic image identification system (OCR) can obtain a license plate number of the vehicle
Code, and the number-plate number, the credit card number and Time of Day are stored in database 4, so that subsequently dispatching bill gives the use
Family, then step S624 is carried out, in a preferred embodiment, RFID automation Lane regulation systems can through a cash advance program
The cash card remaining sum 379 is given directly to prepay a quota cash, a transaction news in brief or Email is also can transmit to the reception
News in brief number 370 is then return to step S619 and once withholdd again as authority.
Figure 14 is referred to, it is the preferred embodiment RFID tag Item Processing System (RFID TIPS) 22 of the application the 7th
For the schematic diagram of a radio frequency identification information system (RFID IS) 1, the RFID IS 1 recognize comprising a radio frequency identification
Card system (RFID AS) 2 and an electronic tag 3, the electronic tag 3 have a label identifier 31, and the RFID AS 2 include one
RFID TIPS 22, the RFID TIPS 22 include a reader 221, a local computer 222, a numeric keypad 223 and
One display 225.In fig. 14, the application method of the RFID TIPS 22 is comprised the steps of, step S701:Local computer
222 operating system is activated, in one embodiment, and the operating system is the tag operational system that financial circles and cash consumption are applied
Unite (Tag Operating System, TOS), in another embodiment, the operating system is the mark that gate inhibition and supply chain are applied
Project operation system (Tag Item Operating System, TIOS) is signed, in another embodiment, the operating system is thing
Stream and project level follow the trail of tagged items processing operating system (the Tag Item Processing Operating of application
System, TIPOS), in another embodiment, the operating system is the label data operating system (Tag of data handling utility
Data Operating System,TDOS).Step S702:Then set up local computer 222 online, access local computer
222 network environment, one RFID environment of access and set the parameter value of one group of RFID tag Item Processing System 22 and held
OK, wherein to set up local computer online including through an Internet provider (Internet Service Provider, ISP)
Set up local computer and internet and wireless mobile network on-line comprising in a wired fashion, wireless mode or wired and wireless
The combination of two ways, to access shared database 4 and transmission news in brief or Email, the network environment includes local computing
The title of machine 222 and its code name and its network address, the title of other processing systems 24 and its code name and its network address, data
The title in storehouse 4 and its code name and its network address, Position Number and its conference number of the RFID environment including reader 221,
Channel bands, link frequency, pulsewidth, modulation mode, position transmission speed, number, antenna port Position Number with antenna port
And its transmission power, this group of RFID TIPS 22 parameter value includes one group of external parameter value and includes local computer type
CompType, and one group of Inside Parameter Value include project tupe IPMode, type service ServiceType, first password
Masking value, the second password masking value, first information table length value, the second information table length value, the 3rd information table length value, comparison
Frequency of failure maximum, certification classification AuthenticationType, Hash table 229 and adjustment table 22C, the IPMode bags
Project assignment OPERATION, project service SERVICE, project testing TEST are included, the CompType includes cash consumption, wisdom
Cashing machine, face cabinet service computer, aATM, nuATM, logistics, supply chain, gate inhibition, project level tracking, traffic, science and technology and be
Blanket insurance continues to employ way, and the ServiceType includes setting up tagged items, inquiry tag project, modification tagged items.Step S703:
RFID TIPS 22 are actuated to confirm network environment, and the network environment includes database 4.Step S704:The RFID TIPS
22 select project tupe according to IPMode, as IPMode=" OPERATION ", carry out step S724, work as IPMode=
When " TEST ", step S710 is carried out, as IPMode=" SERVICE ", step S705 is carried out:The RFID TIPS 22 are selected
ServiceType type services, when ServiceType=" modification tagged items ", carry out step S708, when
Step S707 is carried out during ServiceType=" inquiry tag project ", when ServiceType=" setting up tagged items ", is entered
Row step S706:The RFID TIPS 22 are according to the RFID industries subclassification and bullets 358 of project code 357 in a new electricity
Project processing routine of the subtab internal memory to set up Project Information Table and record the event, then carries out step S709 to terminate to lead to
News dialogue.Step S707:The RFID TIPS 22 according to the RFID industries subclassification and bullets 358 of project code 357 in
One electronic tag internal memory is with queried for items information table and records the project processing routine of the event including transmitting news in brief or electronics postal
Then part carries out step S709 to terminate communication session to a reception news in brief number 370.Step S708:The RFID TIPS 22
According to the RFID industries subclassification and bullets 358 of project code 357 in an electronic tag internal memory to change Project Information Table
And the project processing routine of the event is recorded including transmitting news in brief or Email to a reception news in brief number 370.Step S709:
The RFID TIPS 22 terminate and the communication session of electronic tag 3.
In fig. 14, the application method of the RFID TIPS 22 still includes step S710:The RFID TIPS 22 are according to item
The RFID industries subclassification of mesh coding 357 selects project testing classification (TestType), and project testing classification includes a gold medal
Melt industry and other test industries, this other test industries include gate inhibition, supply chain, logistics, project level tracking, traffic, science and technology,
And system retains industry, when TestType is " financial circles ", step S711 is carried out, when TestType is " other test productions
During industry ", step S722 is carried out:The RFID TIPS 22 are according to the RFID industries subclassification and bullets of the project code 357
358 set up and one Project Information Table of test and the project processing routine for recording the event in an electronic tag internal memory, then carry out
Step S723 is to terminate communication session.Step S711:The RFID TIPS 22 start a reader.Step S712:The RFID
TIPS 22 is tested produces a Project Information Table in an electronic tag internal memory.Step S713:The RFID TIPS 22 tests are read
The Project Information Table.Step S714:The test modifications of RFID TIPS 22 Project Information Table.Step S715:The RFID TIPS
22 test the label anti-counterfeit function.Step S716:The RFID TIPS 22 tests compare cryptographic function.Step S717:The RFID
TIPS 22 the second information tables of testing and debugging put in order.Step S718:The RFID TIPS 22 are tested against adjustment second letter
Breath table puts in order.Step S719:Currency function is withholdd and selected to the RFID TIPS 22 test cash consumptions.Step
S720:The RFID TIPS 22 tests produce test report function.Step S721:The RFID TIPS 22 terminate and the electronics mark
Sign communication session.Step S723:The RFID TIPS 22 terminate and the communication session of electronic tag 3.
In fig. 14, the application method of the RFID TIPS 22 still includes step S724:The RFID TIPS 22 start should
Reader 221 includes setting the RFID environment.Step S725:The RFID TIPS 22 according to project code send selection, examination,
And query report instruction, to read an electronic tag 3, in one embodiment, the electronic tag 3 is the gold of superfrequency long range
Melt credit cash certification card, in a preferred embodiment, the electronic tag 3 is the short-range financial credit cash certification of high frequency
Card.Step S726:The RFID TIPS 22, which are obtained, meets the first information table 35 of selection condition, and the first information table 35 includes the
One PC information 351, the first encryption key 352, Customs Assigned Number 355, bullets 358, project code 357 and one 16
CRC error detecting codes.Step S727:Examine block count=" first information table length value " of the first information table 35If unequal,
Step S735 is then carried out to terminate communication session.If equal, then read label identifier 31 and carry out step S728:The RFID
TIPS 22 selects project application classification according to the RFID industries subclassification and CompType of the project code 357, and the project should
With classification include gate inhibition, supply chain, logistics and other application industries, cash consumption, finance and face cabinet service or aATM or
NuFAD, if project application classification=" gate inhibition ", carries out step S729, if the classification=" supply chain ", carries out step
S730, if project application classification=" logistics and other application industries ", the other application industry includes project level and follows the trail of, hands over
Logical, science and technology and system retain industry, then carry out step S731, if project application classification=" cash consumption ", is walked
Rapid S732, if project application classification=" finance carries out step S733 with facing cabinet service or aATM or nuFAD ":The RFID
TIPS 22 is decrypted the key to verify the project processing routine of system, the label true and false and input authentication password.Step
S734:After by plural authentication method, the RFID TIPS 22 are read out second information table 37, are transported through an inverse adjustment
Calculate to obtain user's deposit/drawings account number 374 and an authentication information, compare the authentication information and the authentication password of input, comparing
After success, database 4 just then is accessed using the deposit/drawings account number 374, to complete to deposit or withdraw deposit or transfer transactions, and is remembered
Recording the project processing routine of the transaction includes transmission news in brief or Email to a reception news in brief number, then carries out step S735
To terminate communication session.Step S729:The RFID TIPS 22 are decrypted the key to verify that system and the label true and false are used
In gate inhibition, and record the event project processing routine include transmission news in brief or Email to one receive news in brief number, then
Step S735 is carried out to terminate communication session.Step S730:The RFID TIPS 22 key is decrypted with verify system and
The label true and false is used for supply chain, and records the project processing routine of the event and include transmission news in brief or Email to a reception
News in brief number, then carries out step S735 to terminate communication session.Step S731:The key is decrypted in the RFID TIPS 22
It is used to logistics and other application industries with verify system and the label true and false, and records the project processing routine of the event including passing
Send news in brief or Email to a reception news in brief number, the other application industry includes such as project level tracking, asset management, so
Step S735 is carried out afterwards to terminate communication session.Step S732:The RFID TIPS 22 key is decrypted with verify system,
The label true and false and cash card remaining sum are enough to withhold and Stored Value for cash consumption, and records the project of the transaction and handle journey
Sequence includes transmission news in brief or Email to a reception news in brief number.Step S735:The RFID TIPS 22 terminate and the electronics
The communication session of label 3.
In the preferred embodiment of the application the 8th, tagged items processing system 22 is in an electronic tag 30 not exclusively according to such as
Method described in Fig. 3 sets up project code [15 in the electronic tag 30:0], bullets [15:0] and Customs Assigned Number [15:
0].In one embodiment, user need not use RFID to implement national subclassification coding, but still need RFID industries subclassification,
RFID device subclassification, RFID selections enable the coding such as function subclassification and RFID function subclassifications, in one embodiment,
It then may be selected to use the project code [15:0] and the bullets [15:0] link to set up the mechanism identifier of one 32
[31:0], such as a company or the title of mechanism or its code name or its people's Unified number [31 of doing business:0], while will make originally
Function subclassification and RFID functions subclassification coding are enabled for RFID industries subclassification, RFID device subclassification, RFID selections
The project code [15 used:6], change by another word group or change the 6th to the 15th of the Customs Assigned Number 355 use of totally 10
Family numbering [15:6] set.The electronic tag 3 has a label identifier 31 and an internal memory, and the internal memory can be according to section and block
To distinguish, the RFID tag Item Processing System 22 configures an electronic tag data structure T30 and one group in its working memory
System constants, this group of system constants include first password shield the 2271, second password shielding 22A1, first information table length value,
Second information table length value, computer classification, certification classification, Hash table 229 and adjustment table 22C, the electronic tag data knot
Structure T30, which includes RM blocks 3B, TID field block 3C, UII block 3D and UM block 3E, UII blocks 3D, includes the first memory field
The memory block 38 of block 36 and second, UM blocks 3E can be the 3rd memory block 3G, and TID field block 3C includes a tag recognition
Symbol 31, the label identifier 31 include a label sequence number 313 and manufacturer's numbering 314, the electronic tag data structure T30 according to
According to plural authentication phase store a Project Information Table 33, the Project Information Table 33 comprising first information table 35, the second information table 37,
Project is destroyed password 3B1 and project and accessed to your password 3B2, and first memory block 36 stores the first information table 35, and this
Two memory blocks 38 store second information table 37, and UM blocks 3E stores the 3rd information table 3E0, the first information table
35 include mechanism identifier, the first encryption key 352, the first PC information and Customs Assigned Number 355, and the first PC packets contain
The length value of one first information table 35, first encryption key 352 includes one second sub-information 353, and second sub-information 353 is should
The length value of second information table 37, in a preferred embodiment, the first information table 35 further include a project deadline (Item
Expiration Date) so that the TIPS 22 is examined, second information table 37 includes the second authentication information 371, reception news in brief
The other information 372 of number 370 and second, a user cipher can be included by obtaining second authentication information 371, obtain the reception
News in brief number 370 can include user or other people Mobile Directory Number, and a RFID can be included by obtaining second other information 372
Current control card, the current control cards of the RFID can be used to manage the logical of multiple control gate inhibition areas concentratedly in second memory block 38
Row and the electric equipment for starting the area, such as a RFID Verification Systems can manage the door of transnational, region and city enterprise concentratedly
Prohibit and assets, or manage the control gate inhibition area in hundreds of of hotel of tourism business room and the startup of area's electric equipment, the pipe concentratedly
Gate inhibition area processed is including the use of gymnasium, VIP Room, archive office and parking lot, or centralized management administration, education and research and development
The control gate inhibition area in a large amount of rooms of mechanism and the startup of area's electric equipment, control gate inhibition area is including the use of office, experiment
Room, research department, meeting room and training classroom.In the gate control system of the centralized management, the startup news in each control gate inhibition area
Number all passed through with the RFID in control card one it is corresponding.When corresponding position is 1, expression, which has been authorized, passes through and enters the control
Gate inhibition area, the electric equipment that must start, show and record must pass through required for the area includes one news in brief of transmission and receives letter to one
Signal code 370, the electric equipment include roadway barrier machine, rolling door, warning lamp, siren, electronics lock a door, illuminator, control
Gate inhibition's message display and other electric equipments of the area, when corresponding position is 0, expression must not pass through and into the control
Gate inhibition area, must start, show and must not record pass through the area electric equipment include transmission one news in brief to one receive news in brief number
Code 370.In a preferred embodiment, the RFID passes through control card still using other memory blocks of the electronic tag or section,
Such as UM blocks, the startup of the current and electric equipment in centralized management more control gate inhibition area is used as using it.The TIPS 22
Include according to plural authentication phase in the method that an electronic tag 30 sets up a Project Information Table 33:The RFID TIPS 22 are at it
An electronic tag data structure T30 and one group of system constant value are configured in working memory, the electronic tag data structure is initialized
T30, the electronic tag data structure T30 are stored in a Project Information Table 33, the Project Information Table 33 according to plural authentication phase
Parameters, the project are destroyed password 3B1 and the project and accessed to your password 3B2, and the Project Information Table 33 includes the first information
Table 35 and second information table 37.The RFID TIPS 22 read the label identifier 31 of the electronic tag 30 and are stored in the electricity
Subtab data structure T30 label identifier 31, it includes the label sequence number 313 and manufacturer's numbering 314.The RFID
TIPS 22 is recognized according to the user company or the title of mechanism or its code name or its people's Unified number of doing business with producing the mechanism
Symbol.The RFID TIPS 22 enable function subclassification and the RFID according to the RFID industries, the RFID device, RFID selections
The subclassifications such as function are that the user is encoded, to produce the Customs Assigned Number 355.The RFID TIPS 22 set project cut-off
Day, make it have a valid period.The RFID TIPS 22 according to the Customs Assigned Number 355, the label sequence number 313 and this
Two sub-informations 353 are encrypted, to produce first encryption key 352, and second sub-information 353 is the second information table length
Value.The RFID TIPS 22 set the first PC information 351 and include a system initial value, and it is the first information table length value,
In a preferred embodiment, the length value is 7.The RFID TIPS 22 obtain parameters value in second information table 37, its
Include the every setting value of the current control cards of RFID for obtaining the user cipher and the user.The RFID TIPS 22 are according to the label
Sequence number 313, first password shielding 2271 and the Hash table 229, produce the project and destroy password 3B1 and project access
Password 3B2.According to the label sequence number 313, second password shielding 22A1 and adjustment table 22C, one group of arrangement adjustment is obtained
Computing, adjusts the parameters address of the second information table 39, produces the second information table 39 with different arrangementsN.The RFID
TIPS 22 stores electronic tag data structure T30 to the electronic tag 30, and electronic tag data structure T30 includes should
First information table 35, second information table 37, the 3rd information table 3E0, the project destroy password 3B1 and project access
Password 3B2.The tagged items processing system 22 is included using the method for the electronic tag 30:The tagged items of the local computer
Operating system is activated.Then perform that to set up the local computer online, access local computer network environment, less radio-frequency are distinguished
Know one group of system parameter values of environment and initialization, this group of system parameter values include Position Number, meter of the reader 221
Calculation machine classification and the certification classification, wherein the computer classification are that gate inhibition, the certification classification are gate inhibition's certification.It is another compared with
In good embodiment, the certification classification further includes logistics certification and supply chain certification.Start the tagged items processing system 22 with true
Recognize the local computer network environment.The RFID TIPS 22 start the reader 221, and it includes setting the radio frequency identification
Environment.The RFID TIPS 22 choose the electronic tag 30 according to the mechanism identifier.The RFID TIPS 22 read the electronics
The first information table 35 of label 30 includes the Customs Assigned Number 355 and the project deadline.The RFID TIPS 22 read the label
Identifier 31 includes the label sequence number 313.Examine the length value and the project deadline of first information table 35.The RFID TIPS
22 decrypt first encryption key 352 to obtain the second sub-information 353 using the label sequence number 313 and the Customs Assigned Number 355.Should
RFID TIPS 22 examine second sub-information 353 with the true and false of certification electronic tag and confirm to belong to phase with the electronic tag 3
Homologous ray.The RFID TIPS 22 read second information table 39.The RFID TIPS 22 are through an inverse adjustment computing to obtain original
Begin the second information table 37 arranged.Certification second authentication information 371 is inputted comprising one authentication information of selection with comparing the user
Authentication password, compare successfully rear and can be used second other information 372, the alignments include comparing " the reader bit
Numbering is put in the corresponding place value of the current control cards of the RFID "=" 1 "If equal, then the electrical equipment in control gate inhibition area is opened
Equipment, and this event is recorded including one news in brief of transmission to the reception news in brief number 370, if unequal, then it is not turned on the control
The electric equipment in gate inhibition area, showing " unauthorized enters one's respective area " and recording this event includes one news in brief of transmission to the reception news in brief
Number 370.
In the preferred embodiment of the application the 9th, TIPS 22 in an electronic tag 30 not according to method as described in Figure 3 in
The electronic tag 30 sets up project code [15:0], bullets [15:0] and Customs Assigned Number [15:0].In an embodiment
In, user does not need RFID industries subclassification coding and RFID to implement national subclassification coding, but stills need RFID device son point
Class, RFID selections enable the coding such as function subclassification and RFID function subclassifications, in a preferred embodiment, then may be selected
By the project code [15:0] and the bullets [15:0] link to set up the cell identifier [31 of one 32:0], such as one
Cell or the title of corporations or its code name or its people's Unified number [31 of doing business:0], while original RFID device son point will be used as
Class, RFID selections enable the project code [12 that function subclassification and RFID functions subclassification coding are used:6], change by another
One word group changes the 9th to the 15th of the Customs Assigned Number 355 Customs Assigned Number [15 of totally 7:9] set.The electronic tag 3
With a label identifier 31 and an internal memory, the internal memory can be distinguished according to section and block, and the RFID TIPS 22 are in its work
An electronic tag data structure T30 and one group of system constants are configured in internal memory, this group of system constants are shielded including first password
2271st, the second password shielding 22A1, first information table length value, the second information table length value and Hash table 229, the electronics
Tag data structure T30 includes RM blocks 3B, TID field block 3C, UII block 3D and UM block 3E, and UII blocks 3D includes
First memory block 36 and the second memory block 38, UM blocks 3E can be the 3rd memory block 3G, and TID field block 3C is included
One label identifier 31, the label identifier 31 includes a label sequence number 313 and manufacturer's numbering 314, the electronic tag number
A Project Information Table 33 is stored according to plural authentication phase according to structure T30, the Project Information Table 33 includes first information table 35, the
Two information tables 37, the 3rd information table 3E0, project are destroyed password 3B1 and project and accessed to your password 3B2, first memory block 36
The first information table 35 is stored, second memory block 38 stores second information table 37, UM blocks 3E stores this
3rd information table 3E0, the first information table 35 includes cell identifier, the first encryption key 352, the first PC information, Yi Jiyong
Family numbering 355, the first PC information 351 includes the length value of first information table 35, and first encryption key 352 includes the second son letter
Breath 353, second sub-information 353 is the length value of second information table 37, in a preferred embodiment, the first information table 35
A project deadline is further included so that the TIPS 22 is examined, second information table 37 receives news in brief number 370 and 1 the comprising one
Two other informations 372, the reception news in brief number 370 can be user or other people Mobile Directory Number, second other letters
Breath 372 starts control table comprising one.In one embodiment, the startup control table can only have the word group of one 16, and each is used as
The current of one control gate inhibition area of correspondence starts signal.When corresponding position is 1, expression, which has been authorized, passes through and enters control door
Forbidden zone, must start and show that the electric equipment in the area that must pass through includes one news in brief of transmission to a reception news in brief number 370, the electrical equipment
Equipment includes roadway barrier machine, rolling door, warning lamp, siren, electronic lock, illuminator, control gate inhibition's message display or is somebody's turn to do
Other electric equipments of area, when corresponding position is 0, represent that card holder must not pass through and into control gate inhibition area, must start
And must not show the pass through electric equipment in the area and include one news in brief of transmission and receive news in brief number 370 to one.In one embodiment, should
Start RFID gate inhibition's control system that control table can be used for a cell and medium-sized and small enterprises, its control gate inhibition area includes cell gate door
Taboo, building gate inhibition, building meeting room gate inhibition, building office gate inhibition, building reading room gate inhibition, building gymnasium gate inhibition, building
Multimedia recreation room gate inhibition, building elevator starter and underground roadways fence starter etc..The TIPS 22 is in an electronics mark
The method that label 30 set up a Project Information Table 33 according to plural authentication phase includes:The RFID TIPS 22 are in its working memory
An electronic tag data structure T30 and one group of system constant value are configured, electronic tag data structure T30 is initialized, it includes
Parameters, the project destroy password 3B1 in one Project Information Table 33, the Project Information Table 33 and the project accesses to your password
3B2, the Project Information Table 33 includes the first information table 35 and second information table 37.The RFID TIPS 22 read the electronics
The label identifier 31 of label 30 and the label identifier 31 for being stored in electronic tag data structure T30, it includes the label
Sequence number 313 and manufacturer's numbering 314.The RFID TIPS 22 according to user's cell or medium-sized and small enterprises (SME) title or
Its code name or its people's Unified number of doing business are to produce the cell identifier.The RFID TIPS 22 are according to the RFID device, RFID
Selection enables the subclassification such as function subclassification and the RFID functions and encoded for the user, to produce the Customs Assigned Number
355.The RFID TIPS 22 set the project deadline, are the valid period of the electronic tag before the project deadline.
The RFID TIPS 22 are encrypted according to the Customs Assigned Number 355, the label sequence number 313 and second sub-information 353, with
First encryption key 352 is produced, second sub-information 353 is the second information table length value.The RFID TIPS 22 are set
First PC information 351 includes a system initial value, and it is the first information table length value, in a preferred embodiment, the length
Angle value is 7.The RFID TIPS 22 obtain parameters value in second information table 37, and it sets comprising the startup control table is obtained
Definite value.The RFID TIPS 22 are produced according to the label sequence number 313, first password shielding 2271 and the Hash table 229
The project is destroyed password 3B1 and the project and accessed to your password 3B2.The RFID TIPS 22 store up electronic tag data structure T30
Deposit to the electronic tag 30, electronic tag data structure T30 include the first information table 35, second information table 37, this
Three information table 3E0, the project are destroyed password 3B1 and the project and accessed to your password 3B2.The TIPS 22 uses the electronic tag 30
Method include:The tagged items operating system of the local computer is activated.Then perform that to set up the local computer online,
Access local computer network environment, one group of system parameter values of radio frequency identification environment and initialization, this group of systematic parameter
Value includes the Position Number of reader 221.The tagged items processing system 22 is actuated to confirm the local computer network ring
Border.The RFID TIPS 22 start the reader 221, and it includes setting the radio frequency identification environment.The RFID TIPS 22
The electronic tag 30 is chosen according to the cell identifier.The RFID TIPS 22 read the first information table 35 of the electronic tag 30
Include the Customs Assigned Number 355 and the project deadline.The RFID TIPS 22 read the label identifier 31 and include the label sequence
Numbers 313.The RFID TIPS 22 examine the length value and the project deadline of first information table 35.The RFID TIPS 22 are utilized
The label sequence number 313 decrypts first encryption key 352 to obtain the second sub-information 353 with the Customs Assigned Number 355.The RFID
TIPS 22 examines second sub-information 353 with the true and false of certification electronic tag and confirms to belong to same tie with the electronic tag 3
System.The RFID TIPS 22 read second information table 37.The RFID TIPS 22 using second other information 372 include than
To " corresponding place value of the reader Position Number in the startup control table "=" 1 "If equal, start control gate inhibition area
Electric equipment, and this event is recorded including transmission news in brief to the reception news in brief number 370, if unequal, do not start the control
The electric equipment in gate inhibition area, showing " unauthorized entry one's respective area " and recording this event includes transmission news in brief to the reception news in brief number
Code 370.
In summary, explanation of the invention and embodiment have been exposed in, and so its non-is used for limiting the present invention, all this areas
Technical staff, is not departing under spirit and scope of the invention, and when that can do various changes and modification, it should belong in the present invention
Within the covering scope of patent.
Description of reference numerals
1:Radio frequency identification information system 2:Radio frequency identification Verification System
(RFID IS) (RFID AS)
3:Electronic tag 4:Database
5:Network connection device 6:Internet
7:Wireless mobile network equipment
21:Network connections 22:RFID tag Item Processing System
(RFID TIPS)
23:Network connections 24:Other processing systems
30:Electronic tag 31:Label identifier
33:Project Information Table 34:Tag memory
35:First information table 36:First memory block
37:Second information table 38:Second memory block
39:Second information table 3B:Reserved memory block
3C:Label identifier memory block 3D:Unique items recognize memory block
3E:User memory block 3G:3rd memory block
3J:Antenna 3K:Interface and communication control circuit
221:Reader 222:Local computer
223:Numeric keypad 224:Antenna
225:Display 226:Radio frequency identification dedicated channel
227:With door 228:1 encoder
229:Hash table (Hash Table) 22A:With door
22B:4 encoder 22C:Adjust table (Adjust Table)
22D:Reader connecting line 22E:Numeric keypad connecting line
22F:Display connecting line 313:Label sequence number
314:Manufacturer's numbering 350:First authentication information
351:First PC information 352:First encryption key
353:Second sub-information 354:First other information
355:Customs Assigned Number 357:Project code
358:Bullets 370:Second encryption key
371:Second authentication information 372:Second other information
373:3rd sub-information 374:Deposit/drawings account number
375:Deposit/drawings password 376:Credit card number
377:Face cabinet password 378:Cash card balance amount information
379:Cash card remaining sum 37A:Credit clip pin
37E:Compare frequency of failure 37F:Cash card remaining sum currency
37G:Cash card shop encodes 37I:Cash card goods number
37J:Cash card boarding station numbering 37K:Cash card use state
3B1:Project destroys password 3B2:Project accesses to your password
3E0:3rd information table 3E1:Account transfer account number table
3E2:The current control card 3E3 of RFID:Receive news in brief directory
RB1:Read the RB2 of memory block 1:Read memory block 2
RB3:Read the T30 of memory block 3:Electronic tag data structure
Claims (17)
1. a kind of be used to ensure the processing system of electronic tag, the electronic tag has label sequence number, and the processing system is included:
Computer shields and included the first information table of more than first information unit there is provided first password, wherein this more than first
Information unit is arranged according to first order order;And
Reader, is electrically connected to the computer, wherein by using the reader, the computer according to the label sequence number and
The first password shields to adjust first order order to produce the second information table.
2. processing system as claimed in claim 1, wherein:
The computer accesses the label sequence number by the reader, and second information table is written into this by the reader
Electronic tag;
The processing system is further included:
Keyboard, is electrically connected to the computer;And
Display, is electrically connected to the computer, and wherein the computer controls the reader, the keyboard and the display, and
Communicated by the reader with the electronic tag;
The electronic tag includes tag memory, and with user;
The tag memory stored tag identifier and Project Information Table;
The label identifier is numbered comprising label sequence number and manufacturer;
The Project Information Table is destroyed password, project and accessed to your password and particular portion comprising the 3rd information table, second information table, project
Point;
3rd information table has first information table length value, and includes the other letters of the first authentication information, encryption key and first
Breath;
First authentication information includes project code, Customs Assigned Number and project deadline;
The encryption key includes sub-information;
First other information includes bullets and Protocol Control Information;
More than first information unit has the first total information unit numbers;
Second information table has the second information table length value, and includes more than second letters with the second total information unit numbers
Interest statement position, wherein the second total information unit numbers are equal to the first total information unit numbers, more than first information unit
The information content is same as the information content of more than second information unit, and the second information table length value is equal to second total letter
Interest statement bits number;
More than second information unit receives news in brief number and the second other information comprising the second authentication information, first, and is root
It is arranged according to the second order order different from the first order order;
The first reception news in brief number will be by the processing system using to be linked to specific external device (ED), and wherein the specific outside is filled
It is running gear to put;
Second other information includes startup control table;
The specific part of the Project Information Table, which has, applies coding information, and comprising second authentication information and this is second other
At least one of information;
The processing system stores the first information table and one group of system constants, wherein this group system constants comprising computer classification,
It is system digits, certification classification, the first information table length value, the second information table length value, first password shielding, second close
Code shielding, Hash table and adjustment table;
The sub-information represents one of the second information table length value and the system digits;
The electronic tag is applied to as the application specific functionality performed by the processing system;
The application specific functionality comprising financial function, gate inhibition's control function, cash consumption function, credit card function, face cabinet service
Function, toll management function, communication function, logistics function, production management function, work attendance management function, authentication function, business
Product peddle management function, Car park payment function, supply chain function, project level tracking function, asset management functions, and combinations thereof
At least one;
In establishment stage, the processing system sets up the Project Information Table, and the Project Information Table is written into the electronic tag;
The processing system performs the application specific functionality by using the project code;
In authentication phase after this setup stage, the processing system certification electronic tag;And
After the authentication phase, the processing system produces the friendship for the application specific functionality according to this using coding information
Easy message, and the trading message is sent to by the specific external device (ED) according to the first reception news in brief number.
3. processing system as claimed in claim 2, wherein:
The first information table is raw information table;
In the establishment stage, the processing system is set according to the label sequence number, first password shielding and the first information table
Fixed second information table, wherein:
The label sequence number has binary value, and the binary value has M position, wherein M>1;
The processing system is shielded according to the first password, selects N number of position to produce the first value, wherein N from the M position>1;
The processing system encodes first value to produce control signal;And
The processing system is adjusted according to the adjustment table, the first information table and the control signal by arrangement adjustment computing is performed
Whole first order order is to produce second information table;
In the authentication phase, the processing system performs authentication algorithm with the certification electronic tag, and the wherein authentication algorithm is read
3rd information table of the electronic tag, and by the encryption key decryption to determine that the sub-information indicates whether second information table
One of length value and the system digits;
When the sub-information represents one of the second information table length value and the system digits, the processing system confirms should
Authentication algorithm passes through certification;
After the electronic tag is by the authentication algorithm, the processing system reads the electricity according to the second information table length value
Second information table of subtab;And
After reason system reads second information table in this place, the processing system is shielded according to the label sequence number, the first password
With second information table, second information table is converted into the 4th information table by the inverse arrangement adjustment computing of execution, wherein:
4th information table includes the 3rd many information units;
The information content of 3rd many information units is same as the information content of more than first information unit;
3rd many information units are put in order and are arranged according to being same as the 3rd of the first order order;And
The processing system performs the inverse arrangement adjustment computing to produce according to the adjustment table, second information table and the control signal
Raw 4th information table.
4. processing system as claimed in claim 2, wherein:
Second authentication information, which is further included, is contained within this using the cash card remaining sum in coding information;
The application specific functionality is the cash consumption function, and is performed by using the cash card remaining sum;
Before the establishment stage, the processing system by preset using default number this first receive news in brief number;
In the establishment stage, the processing system sets the first reception news in brief number by the first user input is received;
The processing system updates the cash card remaining sum to form cash card balance updates by the application specific functionality is performed;
The processing system is according to the cash card balance updates, and it is specific outer so that the trading message is sent into this to produce the trading message
Part device;And
It is certified into the electronic tag really to belong to the processing system after identical systems, when the user is desired
Between, the processing system receives news in brief number by the second user input received from the user with the user desired second
Substitute the first reception news in brief number.
5. processing system as claimed in claim 2, wherein:
The computer is local computer;
The electronic tag is radio RF identification label;
The reader includes reader antenna and the first interface for being electrically connected to the reader antenna and Control on Communication electricity
Road, the wherein reader antenna include at least one of the first ultra-high frequency antenna and the first high-frequency inductor coil;
The electronic tag further include label antenna and be electrically connected to the label antenna and the tag memory the second interface and
Communication control circuit, the wherein label antenna comprising the second ultra-high frequency antenna and the second high-frequency inductor coil at least within it
One;
The startup control table includes multiple positions, and is contained within this using in coding information, and the plurality of position corresponds respectively to multiple
Start signal;
The application specific functionality is gate inhibition's control function, and is performed by using the startup control table to control specific tube
The electric equipment in gate inhibition area processed, the wherein specific control gate inhibition area are used for the user and the application dress that control has the electronic tag
One of put;
The plurality of position includes certain bits, and the certain bits are used to control the specific startup signal in the plurality of startup signal,
Wherein this it is specific start signal control the electric equipment with determine the user and the application apparatus wherein this one whether be allowed to
Into the specific control gate inhibition area;
The certain bits represent one of licensing status and unauthorized state;
When the certain bits represent the licensing status, the processing system by perform the application specific functionality, make the user and
The application apparatus wherein this one be allowed to enter the specific control gate inhibition area;
When the certain bits represent the unauthorized state, the processing system by perform the application specific functionality, make the user and
The application apparatus wherein this one be prohibited from entering the specific control gate inhibition area;
The processing system produces the trading message trading message is sent into the specific external device (ED) according to the certain bits;
In the establishment stage, the processing system is according to the predetermined wireless radio-frequency discriminating function combined with the electronic tag, setting
The project code, wherein:
The predetermined wireless radio-frequency discriminating function is comprising the financial function, the credit card function, this faces cabinet service function, the cash and disappear
Take function, news in brief transmitting function, cash card remaining sum currency selection function, gate inhibition's control function, project level tracking function, the spy
Determine at least one of hyperfrequency access distance applications function, specific high frequency access distance applications function and its combination,
The specific hyperfrequency access distance applications function is passive type hyperfrequency length access distance applications function, passive type hyperfrequency
Short access distance applications function, the short access distance applications function of the passive type hyperfrequency with relatively high memory size, high frequency are short
Access distance applications function, semi-passive hyperfrequency length access distance applications function, when the electronic tag move for positioning
Semi-passive hyperfrequency far access distance applications function, the semi-passive hyperfrequency with relatively high memory size far access away from
Passive type hyperfrequency length access distance applications function from application function, for positioning, with the passive of relatively high memory size
Formula hyperfrequency length access distance applications function, passive type hyperfrequency closely access distance applications function and held with relatively high internal memory
The passive type hyperfrequency of amount closely accesses one of distance applications function, and
The specific high frequency access distance applications function is the short access distance applications function of high frequency, the height with relatively high memory size
Frequently short access distance applications function, the passive type high frequency for gate inhibition's control and positioning short access distance applications function and had
One of short access distance applications function of passive type high frequency of relatively high memory size;
In the establishment stage, the processing system according to the sub-information and the label sequence number and both Customs Assigned Numbers at least its
One of, by setting the encryption key using certain operations, wherein:
The certain operations are one of the first computing, the second computing, the 3rd computing and the 4th computing,
First computing is total into first equal to the label sequence number, the Customs Assigned Number and the sub-information by the encrypted key setting
With,
Second computing by the encrypted key setting into equal to the label sequence number and the second summation of the sub-information,
3rd computing is by the encrypted key setting into equal to the result obtained from arithmetical operation, and the arithmetical operation is applied to
The sub-information and the label sequence number and both Customs Assigned Numbers at least one, and
4th computing captures certain number of position from one selected in first summation, second summation and the result, with
Binary value is produced, and by the encrypted key setting into equal to the binary value;And
The processing system is radio RF identification label Item Processing System.
6. processing system as claimed in claim 2, wherein:
The tag memory more store be contained within this using in coding information can measurement parameters information, wherein this can measurement parameters
Packet is containing use time, distance, weight, flow, cash card remaining sum, the boarding station numbering of popular traffic and flight path
At least one of landing field numbering;
The application specific functionality is the toll management function, and by using this can measurement parameters information and be performed;
The processing system by performing the application specific functionality, by this can measurement parameters information be converted into toll amount to hand over
Easily, and according to the transaction produce the trading message trading message is sent into the specific external device (ED);
The processing system more provides system messages, and the trading message is more generated according to the system messages;
In the establishment stage, the processing system sets this according to the label sequence number, second password shielding and the Hash table
Mesh destroys password and the project accesses to your password;
The label sequence number has binary value, and the binary value has M position, wherein M>1;
The project destroys password and the project accesses to your password and is set in one of first state and the second state, its
In:
When the project, which destroys password and the project to access to your password, to be set in the first state:
The processing system is shielded according to second password, and certain bits are selected from the binary value to produce the first value;
The processing system encodes first value to produce the first control signal;
When the first control signal represents odd number, the processing system performs the first encryption according to the Hash table and the odd number and transported
Calculate, accessed to your password value with producing the first destruction password value and first, and the project destroyed into password and the project access to your password and set
Determine into the respectively equal to first destruction password value and this first accesses to your password value;And
When the first control signal represents even number, the processing system performs the second encryption according to the Hash table and the even number and transported
Calculate, accessed to your password value with producing the second destruction password value and second, and the project destroyed into password and the project access to your password and set
Determine into the respectively equal to second destruction password value and this second accesses to your password value;And
When the project, which destroys password and the project to access to your password, to be set in second state:
The processing system is shielded according to second password, selects N number of position to produce second value, wherein N from the M position>1;
The processing system encodes the second value to produce the second control signal;
The processing system performs the 3rd cryptographic calculation according to the Hash table and the second control signal, close to produce the 3rd destruction
Code value and the 3rd accesses to your password value;And
Are destroyed into password by the project for the processing system and the project accesses to your password and is set to the respectively equal to the 3rd destruction password value
Accessed to your password value with the 3rd.
7. a kind of electronic tag, shields according to first password and to be ensured that, the electronic tag is included:
Tag memory, stored tag sequence number and the first information table for including more than first information unit, wherein:
More than first information unit is arranged according to first order order;And
The first password is shielded and the label sequence number is used for adjusting first order order producing the second information table.
8. electronic tag as claimed in claim 7, wherein:
The electronic tag has user;
The tag memory stored tag identifier and Project Information Table;
The label identifier is numbered comprising label sequence number and manufacturer;
The Project Information Table is destroyed password, project and accessed to your password and particular portion comprising the 3rd information table, the first information table, project
Point;
3rd information table includes the first authentication information, encryption key and the first other information;
First authentication information includes project code, Customs Assigned Number and project deadline;
The encryption key includes sub-information;
First other information includes bullets and Protocol Control Information;
More than first information unit has the first total information unit numbers, and receives news in brief comprising the second authentication information, first
Number and the second other information;
The first information table has information table length value, and wherein the information table length value is equal to the first total information unit numbers;
This first receives news in brief number system to be processed using to be linked to specific external device (ED), wherein the specific external device (ED)
It is running gear;
Second other information includes startup control table;
The specific part of the Project Information Table, which has, applies coding information, and comprising second authentication information and this is second other
At least one of information;
The processing system provides the 3rd information table and one group of system constants, and wherein this group system constants include computer classification, are
System numeral, certification classification, the information table length value, first password shielding, the shielding of the second password, Hash table and adjustment table;
The sub-information represents one of the information table length value and the system digits;
The electronic tag is applied to as the application specific functionality performed by the processing system;
The application specific functionality comprising financial function, gate inhibition's control function, cash consumption function, credit card function, face cabinet service
Function, toll management function, communication function, logistics function, production management function, work attendance management function, authentication function, business
Product peddle management function, Car park payment function, supply chain function, project level tracking function, asset management functions, and combinations thereof
At least one;
In establishment stage, the Project Information Table is established, and is written to the electronic tag;
The application specific functionality is performed by using the project code;
In authentication phase after this setup stage, the electronic tag is certified;And
After the authentication phase, this is used to produce the trading message for the application specific functionality using coding information,
And the first reception news in brief number is used for the trading message being sent to the specific external device (ED).
9. electronic tag as claimed in claim 8, wherein:
3rd information table is raw information table, and comprising more than second information unit with the second total information unit numbers,
Wherein the second total information unit numbers are equal to the first total information unit numbers, the information content of more than second information unit
The information content of more than first information unit is same as, and more than second information unit is according to different from the first order
The second order of order is sequentially arranged;
In the establishment stage, the first information table is according to the label sequence number, first password shielding and the 3rd information table
And be set;
In the establishment stage, the encryption key be according to the sub-information and the label sequence number with both Customs Assigned Numbers at least
One of them and be set;
In the establishment stage, it is according to the label sequence number, second password that the project, which is destroyed password and the project and accessed to your password,
Shielding and the Hash table and be set;
In the authentication phase, the encryption key is decrypted to determine that the sub-information indicates whether that the information table length value is with this
One of numeral of uniting;
After the authentication phase, the first information table is read according to the information table length value;And
After the authentication phase, the first information table is according to the label sequence number, first password shielding and the first information table
And second information table is converted into, wherein second information table includes the 3rd many information units, the 3rd many information units
The information content be same as the information content of more than second information unit, and the 3rd many information units are according to being same as
The 3rd of the second order order puts in order and is arranged.
10. electronic tag as claimed in claim 8, wherein:
Second authentication information, which is included, is contained within this using the cash card remaining sum in coding information;
The application specific functionality is the cash consumption function, and is performed by using the cash card remaining sum;
Before the establishment stage, by default number is used, the first reception news in brief number is predetermined;
In the establishment stage, by the first user input is received, the first reception news in brief number is set;
By the application specific functionality is performed, the cash card remaining sum is updated to form cash card balance updates;
According to the cash card balance updates, the trading message is generated the trading message being sent to the specific external device (ED);
And
Be certified into the electronic tag really to belong to the processing system after identical systems, the user it is desired should
Time, inputted by the second user from the user is received, the first reception news in brief number is with the user desired second
Receive news in brief number and substituted.
11. electronic tag as claimed in claim 8, wherein:
The electronic tag is radio RF identification label;
The processing system is radio RF identification label Item Processing System;
The startup control table includes multiple positions, and is contained within this using in coding information, and the plurality of position corresponds respectively to multiple
Start signal;
The application specific functionality is gate inhibition's control function, and is performed by using the startup control table to control specific tube
The electric equipment in gate inhibition area processed, the wherein specific control gate inhibition area are used for the user and the application dress that control has the electronic tag
One of put;
The plurality of position includes certain bits, and the certain bits are used to control the specific startup signal in the plurality of startup signal,
Wherein this it is specific start signal control the electric equipment with determine the user and the application apparatus wherein this one whether be allowed to
Into the specific control gate inhibition area;
The certain bits represent one of licensing status and unauthorized state;
When the certain bits represent the licensing status, by the execution application specific functionality, the user and the application apparatus
Wherein this one is allowed to enter the specific control gate inhibition area;
When the certain bits represent the unauthorized state, by the execution application specific functionality, the user and the application apparatus
Wherein this one is prohibited from entering the specific control gate inhibition area;And
According to the certain bits, the trading message is generated the trading message being sent to the specific external device (ED).
12. a kind of be used to ensure the method for electronic tag, the electronic tag has label sequence number, and this method is comprised the steps of:
First password shielding is provided and the first information table of more than first information unit, wherein more than first information unit is included
It is arranged according to first order order;And
Shielded to adjust first order order to produce the second information table according to the label sequence number and the first password.
13. method as claimed in claim 12, wherein:
The electronic tag includes tag memory, and with user;
The tag memory stored tag identifier and Project Information Table;
The label identifier is numbered comprising label sequence number and manufacturer;
The Project Information Table is destroyed password, project and accessed to your password and particular portion comprising the 3rd information table, second information table, project
Point;
3rd information table has first information table length value, and includes the other letters of the first authentication information, encryption key and first
Breath;
First authentication information includes project code, Customs Assigned Number and project deadline;
The encryption key includes sub-information;
First other information includes bullets and Protocol Control Information;
More than first information unit has the first total information unit numbers;
Second information table has the second information table length value, and includes more than second letters with the second total information unit numbers
Interest statement position, wherein the second total information unit numbers are equal to the first total information unit numbers, more than first information unit
The information content is same as the information content of more than second information unit, and the second information table length value is equal to second total letter
Interest statement bits number;
More than second information unit receives news in brief number and the second other information comprising the second authentication information, first, and is root
It is arranged according to the second order order different from the first order order;
The first reception news in brief number will be by the processing system using to be linked to specific external device (ED), and wherein the specific outside is filled
It is running gear to put;
Second other information includes startup control table;
The specific part of the Project Information Table, which has, applies coding information, and comprising second authentication information and this is second other
At least one of information;
This method further includes step:The first information table and one group of system constants are provided, wherein this group system constants include calculating
Machine classification, system digits, certification classification, the first information table length value, the second information table length value, the first password screen
Cover, the shielding of the second password, Hash table and adjustment table;
The sub-information represents one of the second information table length value and the system digits;
The electronic tag is applied to application specific functionality;
The application specific functionality comprising financial function, gate inhibition's control function, cash consumption function, credit card function, face cabinet service
Function, toll management function, communication function, logistics function, production management function, work attendance management function, authentication function, business
Product peddle management function, Car park payment function, supply chain function, project level tracking function, asset management functions, and combinations thereof
At least one;
This method further includes the following steps:
In establishment stage, the Project Information Table is set up, and the Project Information Table is written to the electronic tag;
The application specific functionality is performed by using the project code;
In authentication phase after this setup stage, the certification electronic tag;
After the authentication phase, the trading message for the application specific functionality is produced using coding information according to this;With
And
The trading message is sent to by the specific external device (ED) according to the first reception news in brief number.
14. method as claimed in claim 13, wherein:
The first information table is raw information table;
The step for setting up the Project Information Table includes sub-step:According to the label sequence number, the first password shielding and this first
Information table sets second information table;
The label sequence number has binary value, and the binary value has M position, wherein M>1;
The sub-step for setting second information table includes substep:
Shielded according to the first password, select N number of position to produce the first value, wherein N from the M position>1;
First value is encoded to produce control signal;And
According to the adjustment table, the first information table and the control signal, the first row is adjusted by arrangement adjustment computing is performed
Row order is to produce second information table;
This method further includes the following steps:
In the authentication phase, authentication algorithm is performed with the certification electronic tag, wherein performing the step bag of the authentication algorithm
Containing substep:
Read the 3rd information table of the electronic tag;And
The encryption key decryption is to determine that the sub-information indicates whether the second information table length value and the system digits wherein
One of;
When the sub-information represents one of the second information table length value and the system digits, confirm that the authentication algorithm is led to
Cross certification;
After the electronic tag is by the authentication algorithm, being somebody's turn to do for the electronic tag is read according to the second information table length value
Second information table;And
After second information table is read, according to the label sequence number, first password shielding and second information table, by holding
Second information table is converted into the 4th information table by the inverse arrangement adjustment computing of row, wherein:
4th information table includes the 3rd many information units;
The information content of 3rd many information units is same as the information content of more than first information unit;
3rd many information units are put in order and are arranged according to being same as the 3rd of the first order order;And
The step that second information table is converted into the 4th information table includes sub-step:According to the adjustment table, second letter
Table and the control signal are ceased, performs the inverse arrangement adjustment computing to produce the 4th information table.
15. method as claimed in claim 13, wherein:
Second authentication information, which is further included, is contained within this using the cash card remaining sum in coding information;
The application specific functionality is the cash consumption function, and is performed by using the cash card remaining sum;
The step that the Project Information Table is set up in the establishment stage includes sub-step:Set by the first user input is received
The fixed first reception news in brief number;And
This method further includes the following steps:
Before the establishment stage, by preset using default number this first receive news in brief number;
By the application specific functionality is performed, update the cash card remaining sum to form cash card balance updates;
According to the cash card balance updates, produce the trading message trading message is sent into the specific external device (ED);With
And
After the electronic tag is certified into really, in the user desired time, by receive from the user the
Two users input and substitute the first reception news in brief number with the desired second reception news in brief number of the user.
16. method as claimed in claim 13, wherein:
The electronic tag is radio RF identification label;
The startup control table includes multiple positions, and is contained within this using in coding information, and the plurality of position corresponds respectively to multiple
Start signal;
The application specific functionality is gate inhibition's control function, and is performed by using the startup control table to control specific tube
The electric equipment in gate inhibition area processed, the wherein specific control gate inhibition area are used for the user and the application dress that control has the electronic tag
One of put;
The plurality of position includes certain bits, and the certain bits are used to control the specific startup signal in the plurality of startup signal,
Wherein this it is specific start signal control the electric equipment with determine the user and the application apparatus wherein this one whether be allowed to
Into the specific control gate inhibition area;
The certain bits represent one of licensing status and unauthorized state;
This method further includes the following steps:
When the certain bits represent the licensing status, by the application specific functionality is performed, make the user and the application apparatus
Wherein this one be allowed to enter the specific control gate inhibition area;
When the certain bits represent the unauthorized state, by the application specific functionality is performed, make the user and the application apparatus
Wherein this one be prohibited from entering the specific control gate inhibition area;And
According to the certain bits, produce the trading message trading message is sent into the specific external device (ED);
The step for setting up the Project Information Table includes sub-step:According to the predetermined radio frequency identification combined with the electronic tag
Function, sets the project code, wherein:
The predetermined wireless radio-frequency discriminating function is comprising the financial function, the credit card function, this faces cabinet service function, the cash and disappear
Take function, news in brief transmitting function, cash card remaining sum currency selection function, gate inhibition's control function, project level tracking function, the spy
Determine at least one of hyperfrequency access distance applications function, specific high frequency access distance applications function and its combination,
The specific hyperfrequency access distance applications function is passive type hyperfrequency length access distance applications function, passive type hyperfrequency
Short access distance applications function, the short access distance applications function of the passive type hyperfrequency with relatively high memory size, high frequency are short
Access distance applications function, semi-passive hyperfrequency length access distance applications function, when the electronic tag move for positioning
Semi-passive hyperfrequency far access distance applications function, the semi-passive hyperfrequency with relatively high memory size far access away from
Passive type hyperfrequency length access distance applications function from application function, for positioning, with the passive of relatively high memory size
Formula hyperfrequency length access distance applications function, passive type hyperfrequency closely access distance applications function and held with relatively high internal memory
The passive type hyperfrequency of amount closely accesses one of distance applications function, and
The specific high frequency access distance applications function is the short access distance applications function of high frequency, the height with relatively high memory size
Frequently short access distance applications function, the passive type high frequency for gate inhibition's control and positioning short access distance applications function and had
One of short access distance applications function of passive type high frequency of relatively high memory size;And
The step for setting up the Project Information Table further includes sub-step:Compiled according to the sub-information and the label sequence number with the user
Number the two at least one, by setting the encryption key using certain operations, wherein:
The certain operations are one of the first computing, the second computing, the 3rd computing and the 4th computing,
First computing is total into first equal to the label sequence number, the Customs Assigned Number and the sub-information by the encrypted key setting
With,
Second computing by the encrypted key setting into equal to the label sequence number and the second summation of the sub-information,
3rd computing is by the encrypted key setting into equal to the result obtained from arithmetical operation, and the arithmetical operation is applied to
The sub-information and the label sequence number and both Customs Assigned Numbers at least one, and
4th computing captures certain number of position from one selected in first summation, second summation and the result, with
Binary value is produced, and by the encrypted key setting into equal to the binary value.
17. method as claimed in claim 13, wherein:
The tag memory more store be contained within this using in coding information can measurement parameters information, wherein this can measurement parameters
Packet is containing use time, distance, weight, flow, cash card remaining sum, the boarding station numbering of popular traffic and flight path
At least one of landing field numbering;
The application specific functionality is the toll management function, and by using this can measurement parameters information and be performed;
This method further includes the following steps:
By performing the application specific functionality, by this can measurement parameters information be converted into toll amount to transact business;
According to the transaction, produce the trading message trading message is sent into the specific external device (ED);And
System messages are provided, the wherein trading message is more generated according to the system messages;And
The step for setting up the Project Information Table further includes sub-step:According to the label sequence number, second password shielding and the Kazakhstan
Uncommon table, sets project destruction password and the project accesses to your password, wherein:
The label sequence number has binary value, and the binary value has M position, wherein M>1;
Set the project destroy the sub-step that password and the project access to your password first state and the second state wherein it
It is performed in one;
When the sub-step that setting project destruction password and the project access to your password is performed in the first state, if
The sub-step that fixed project destruction password and the project access to your password includes substep:
Shielded according to second password, certain bits are selected from the binary value to produce the first value;
First value is encoded to produce the first control signal;
When the first control signal represents odd number, the first cryptographic calculation is performed according to the Hash table and the odd number, to produce
First destruction password value and first accesses to your password value, and the project is destroyed into password and the project accessed to your password and be set to respectively etc.
In the first destruction password value and this first access to your password value;And
When the first control signal represents even number, the second cryptographic calculation is performed according to the Hash table and the even number, to produce
Second destruction password value and second accesses to your password value, and the project is destroyed into password and the project accessed to your password and be set to respectively etc.
In the second destruction password value and this second access to your password value;And
When the sub-step that setting project destruction password and the project access to your password is performed in second state, if
The sub-step that fixed project destruction password and the project access to your password includes substep:
Shielded according to second password, select N number of position to produce second value, wherein N from the M position>1;
The second value is encoded to produce the second control signal;
According to the Hash table and the second control signal, perform the 3rd cryptographic calculation and deposited with producing the 3rd destruction password value and the 3rd
Take password value;And
The project is destroyed into password and the project accesses to your password and is set to that the respectively equal to the 3rd destruction password value and the 3rd is deposited
Take password value.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW102105419 | 2013-02-08 | ||
TW102105419A TWI502525B (en) | 2012-04-17 | 2013-02-08 | Electronic tag and authentication system and method for securing electronic tag |
CN201310728850.9A CN103984976B (en) | 2013-02-08 | 2013-12-26 | Method, device and system for using electronic tag |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310728850.9A Division CN103984976B (en) | 2013-02-08 | 2013-12-26 | Method, device and system for using electronic tag |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107273774A true CN107273774A (en) | 2017-10-20 |
CN107273774B CN107273774B (en) | 2020-12-01 |
Family
ID=51293374
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310728850.9A Active CN103984976B (en) | 2013-02-08 | 2013-12-26 | Method, device and system for using electronic tag |
CN201710437735.4A Active CN107273774B (en) | 2013-02-08 | 2013-12-26 | Electronic tag and processing system and method for ensuring electronic tag |
CN201710437311.8A Active CN107256355B (en) | 2013-02-08 | 2013-12-26 | Electronic tag and processing system and method for ensuring electronic tag |
CN201710444961.5A Active CN107273775B (en) | 2013-02-08 | 2013-12-26 | Electronic tag and processing system and method for ensuring electronic tag |
CN201710437312.2A Active CN107133664B (en) | 2013-02-08 | 2013-12-26 | Electronic tag and processing system and method for ensuring electronic tag |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310728850.9A Active CN103984976B (en) | 2013-02-08 | 2013-12-26 | Method, device and system for using electronic tag |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710437311.8A Active CN107256355B (en) | 2013-02-08 | 2013-12-26 | Electronic tag and processing system and method for ensuring electronic tag |
CN201710444961.5A Active CN107273775B (en) | 2013-02-08 | 2013-12-26 | Electronic tag and processing system and method for ensuring electronic tag |
CN201710437312.2A Active CN107133664B (en) | 2013-02-08 | 2013-12-26 | Electronic tag and processing system and method for ensuring electronic tag |
Country Status (1)
Country | Link |
---|---|
CN (5) | CN103984976B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107749085A (en) * | 2017-10-25 | 2018-03-02 | 北京匡恩网络科技有限责任公司 | Ticket card, method and machinable medium using ticket card |
CN109766733A (en) * | 2019-01-07 | 2019-05-17 | 武汉大学 | A kind of RF tag monitoring method based on unique collision collection |
CN113343735A (en) * | 2021-08-05 | 2021-09-03 | 深圳市成为信息技术有限公司 | Tag processing method of reader-writer, reader-writer and storage medium |
CN113705258A (en) * | 2021-08-24 | 2021-11-26 | 电子科技大学 | Data exchange method between reader and RFID (radio frequency identification) tag |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9721237B2 (en) * | 2011-06-24 | 2017-08-01 | Paypal, Inc. | Animated two-dimensional barcode checks |
US11966907B2 (en) * | 2014-10-25 | 2024-04-23 | Yoongnet Inc. | System and method for mobile cross-authentication |
CA3217643A1 (en) * | 2014-12-24 | 2016-06-30 | 10353744 Canada Ltd. | Settlement system and settlement method |
CN104463286A (en) * | 2014-12-30 | 2015-03-25 | 吴军明 | Novel radio frequency identification tag manufacturing method |
US10185949B2 (en) * | 2015-03-05 | 2019-01-22 | American Express Travel Related Services Company, Inc. | System and method for authentication of a mobile device configured with payment capabilities |
CN105354519B (en) * | 2015-10-23 | 2019-03-15 | 福建优安米信息科技有限公司 | A kind of processing data information system and its processing method |
CN108463918B (en) * | 2015-10-30 | 2021-09-03 | 株式会社东芝 | Battery control device and battery system |
CN106874987B (en) * | 2017-03-22 | 2019-06-14 | 成都芯昊芯科技有限公司 | A kind of passive tag chip operating mode configuration method |
CN108053154A (en) * | 2017-11-30 | 2018-05-18 | 云南九方联达供应链管理科技有限公司 | Supply-chain management system based on cloud platform |
CN108269353B (en) * | 2018-01-17 | 2021-04-30 | 北京网信云服信息科技有限公司 | Self-service money exchange machine and self-service money exchange system |
CN109399104A (en) * | 2018-11-19 | 2019-03-01 | 吴建国 | Housing system and its application method with wisdom interface |
DE102019202247A1 (en) * | 2019-02-19 | 2020-08-20 | Siemens Aktiengesellschaft | Procedure and arrangement for protecting a charging station from improper use |
CN110381511B (en) * | 2019-07-24 | 2020-11-20 | 深圳大学 | Non-orthogonal multiple access authentication system based on shared physical layer authentication label |
CN111737344B (en) * | 2020-05-20 | 2023-08-25 | 时时同云科技(成都)有限责任公司 | Data synchronization method and device for tag type weighing equipment |
CN112345531B (en) * | 2020-10-19 | 2024-04-09 | 国网安徽省电力有限公司电力科学研究院 | Transformer fault detection method based on bionic robot fish |
TWI786487B (en) * | 2020-12-11 | 2022-12-11 | 振曜科技股份有限公司 | Intelligent logistics labeling system and method for applying same |
CN112887335A (en) * | 2021-03-12 | 2021-06-01 | 青岛泰岳轨道交通研究所有限公司 | Authentication method, chip, device and system for railway track traffic switch |
CN113657131B (en) * | 2021-10-20 | 2022-02-11 | 深圳市成为信息技术有限公司 | Label checking method of UHF handheld terminal and UHF handheld terminal |
CN113722720B (en) * | 2021-10-29 | 2022-02-18 | 苏州浪潮智能科技有限公司 | System starting method and related device |
CN114399862B (en) * | 2021-12-16 | 2023-01-13 | 国家核安保技术中心 | Gate passing control method and system based on temperature detection and gate inhibition authorization |
CN114095911B (en) * | 2022-01-20 | 2022-05-03 | 深圳维特智能科技有限公司 | NFC (near field communication) bandwidth adjusting method and device based on wireless network router |
US11995643B2 (en) * | 2022-05-10 | 2024-05-28 | Capital One Services, Llc | System and method for providing a temporary virtual payment card |
CN115186854B (en) * | 2022-09-07 | 2022-12-16 | 艾斯特国际安全技术(深圳)有限公司 | Certificate acquisition control method, device and system and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004200829A (en) * | 2002-12-17 | 2004-07-15 | Furukawa Electric Co Ltd:The | Rf id tag |
CN101226600A (en) * | 2007-01-18 | 2008-07-23 | 中国科学院自动化研究所 | Interactive electronic label, system method employed based on radio frequency recognition technique |
CN102184497A (en) * | 2010-12-24 | 2011-09-14 | 中华电信股份有限公司 | Electronic transaction system and payment method with telegraph number as account number |
CN102812482A (en) * | 2010-03-30 | 2012-12-05 | 维萨国际服务协会 | Event access with data field encryption for validation and access control |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3335987B2 (en) * | 1998-07-22 | 2002-10-21 | 日本電信電話株式会社 | Non-contact IC card reader |
AUPQ777200A0 (en) * | 2000-05-26 | 2000-06-22 | Embridge Lake Pty Ltd | Control system |
CN1696986A (en) * | 2004-05-11 | 2005-11-16 | 张金生 | Wireless network early warning anti-theft device |
CN1655161A (en) * | 2005-03-07 | 2005-08-17 | 福建榕基软件开发有限公司 | Business delivery certification system |
US20080129037A1 (en) * | 2006-12-01 | 2008-06-05 | Prime Technology Llc | Tagging items with a security feature |
US20080244714A1 (en) * | 2007-03-27 | 2008-10-02 | Michael Kulakowski | Secure RFID authentication system using non-trusted communications agents |
CN101440675A (en) * | 2007-11-20 | 2009-05-27 | 长盛科技股份有限公司 | Gate inhibition control method and system thereof |
CN101908176A (en) * | 2010-08-02 | 2010-12-08 | 国电南瑞科技股份有限公司 | Method for modeling on basis of power information data and applying metadata management |
CN101980273A (en) * | 2010-11-04 | 2011-02-23 | 银川市高新电子应用技术研究所 | Radio frequency identification technology-based commodity sales management system and method |
CN102176718A (en) * | 2010-12-28 | 2011-09-07 | 山东大学 | Campus card based electrical and electronic experimental center comprehensive management system |
CN102750558A (en) * | 2011-04-20 | 2012-10-24 | 张默 | Implementation method of multifunctional intelligent electronic label management system based on cloud computation |
CN102298753A (en) * | 2011-08-02 | 2011-12-28 | 悦捷科技股份有限公司 | Anti-counterfeiting system for product |
CN102289768A (en) * | 2011-08-24 | 2011-12-21 | 悦捷科技股份有限公司 | Electronic transaction system |
CN102509238A (en) * | 2011-11-29 | 2012-06-20 | 成都安朗电气自控设备有限公司 | Bank non-cash business processing method, apparatus and system |
CN102880887B (en) * | 2012-08-07 | 2015-12-16 | 深圳市金之彩文化创意有限公司 | There is product information read method and the system of the alcohol product of metal external packing box |
CN102855509A (en) * | 2012-08-28 | 2013-01-02 | 湖南爱瑞杰科技发展股份有限公司 | Novel motor vehicle driving license and management system thereof |
CN102867344A (en) * | 2012-09-07 | 2013-01-09 | 湖南爱瑞杰科技发展股份有限公司 | Internet of Things entrance guard checking-in system and device |
CN102916956A (en) * | 2012-10-15 | 2013-02-06 | 北京理工大学 | Hash function based RFID (Radio Frequency IDentification) mutual authentication method |
-
2013
- 2013-12-26 CN CN201310728850.9A patent/CN103984976B/en active Active
- 2013-12-26 CN CN201710437735.4A patent/CN107273774B/en active Active
- 2013-12-26 CN CN201710437311.8A patent/CN107256355B/en active Active
- 2013-12-26 CN CN201710444961.5A patent/CN107273775B/en active Active
- 2013-12-26 CN CN201710437312.2A patent/CN107133664B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004200829A (en) * | 2002-12-17 | 2004-07-15 | Furukawa Electric Co Ltd:The | Rf id tag |
CN101226600A (en) * | 2007-01-18 | 2008-07-23 | 中国科学院自动化研究所 | Interactive electronic label, system method employed based on radio frequency recognition technique |
CN102812482A (en) * | 2010-03-30 | 2012-12-05 | 维萨国际服务协会 | Event access with data field encryption for validation and access control |
CN102184497A (en) * | 2010-12-24 | 2011-09-14 | 中华电信股份有限公司 | Electronic transaction system and payment method with telegraph number as account number |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107749085A (en) * | 2017-10-25 | 2018-03-02 | 北京匡恩网络科技有限责任公司 | Ticket card, method and machinable medium using ticket card |
CN109766733A (en) * | 2019-01-07 | 2019-05-17 | 武汉大学 | A kind of RF tag monitoring method based on unique collision collection |
CN109766733B (en) * | 2019-01-07 | 2021-05-18 | 武汉大学 | Radio frequency tag monitoring method based on unique collision set |
CN113343735A (en) * | 2021-08-05 | 2021-09-03 | 深圳市成为信息技术有限公司 | Tag processing method of reader-writer, reader-writer and storage medium |
CN113343735B (en) * | 2021-08-05 | 2021-11-05 | 深圳市成为信息技术有限公司 | Tag processing method of reader-writer, reader-writer and storage medium |
CN113705258A (en) * | 2021-08-24 | 2021-11-26 | 电子科技大学 | Data exchange method between reader and RFID (radio frequency identification) tag |
Also Published As
Publication number | Publication date |
---|---|
CN107273775B (en) | 2020-06-05 |
CN107273774B (en) | 2020-12-01 |
CN107133664A (en) | 2017-09-05 |
CN107256355A (en) | 2017-10-17 |
CN107256355B (en) | 2020-10-16 |
CN107273775A (en) | 2017-10-20 |
CN103984976A (en) | 2014-08-13 |
CN103984976B (en) | 2017-06-30 |
CN107133664B (en) | 2020-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103984976B (en) | Method, device and system for using electronic tag | |
TWI587226B (en) | Electronic tag and processing system and method for securing electronic tag | |
US11087316B2 (en) | Electronic tag and system and method for securing electronic tag | |
US20210350197A1 (en) | Electronic tag and system and method for securing electronic tag | |
US8025223B2 (en) | System and method for mass transit merchant payment | |
US7822618B2 (en) | Home delivery box and home delivery baggage collecting/delivering system and method therefor | |
US6764001B1 (en) | Electronic money system and transaction method using the same | |
EP3174240A1 (en) | Digital token system for physical medium digitalization and physical store optimization | |
CN104182813A (en) | Media Management | |
CN101002217A (en) | Pharmaceutical product tracking | |
US20130103528A1 (en) | Methods for using a shopping bag of reusable type with identification of digital type | |
CN105354518B (en) | Virtual chip card system based on mobile intelligent terminal soft excitation electromagnetic near field mutual inductance | |
CN102129650A (en) | Network finance | |
US20020063157A1 (en) | Auto settlement system using locker | |
CN103886453A (en) | Confirmation payment system using human body biological characteristics, and corresponding method | |
CN107169719A (en) | Encrypt express waybill and express delivery automatic access system | |
CN206931112U (en) | Encrypt express waybill and express delivery automatic access system | |
JP2874341B2 (en) | Money transfer system | |
JP4340059B2 (en) | Delivery box unit and delivery service collection system | |
KR20170124472A (en) | System and method for delivery service | |
CN107798735A (en) | A kind of BRT bus rapid transits automatic ticket-selling system | |
JP2003044443A (en) | Online individual authentication system, individual authentication data registration center, portable terminal, and online individual authenticating method | |
WO2004075081A1 (en) | Mobile net commerce settlement system | |
JP2007084273A (en) | Home delivery service providing method using ic card compatible locker | |
KR20020083527A (en) | A gateway security system using optical transceiver |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1245949 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant |