Method and system for identifying and managing RF-ID attached objects
First Claim
1. An RF identification tag management method for controlling use of a non-powered RF-ID tag on a semiconductor chip, comprising:
- receiving an inquiry from a terminal management server for analyzing RF-ID tag data read-out by radio and deciding the validity of said data;
searching a log database for storing RF-ID tag read-out records;
deciding whether or not there is a record of a past read-out of same said RF-ID tag data; and
verifying whether said RF-ID tag data is genuine and replies to said terminal management server.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention discloses a method and system for making losses due to the counterfeiting of RF-ID tags to a minimum, enhancing the reliability of RF-ID tag read-out and improving the overall reliability of the RF-ID tag system. An ID reader for communicating by radio with the RF-ID tag and reading tag data from the RF-ID tag transmits the data read-out results to a terminal management server connected to the ID reader. The terminal management server decodes the error correction signal from the read-out result data, also extracts the identification number section from the tag, and decides whether or not that identification number is valid. When determined to be a valid identification number, an inquiry is made to the system operation server connected over the network to find out if that identification number was previously read out and if that identification number might be counterfeit. The system operation server then refers to the log database, the blacklist database and process transition rule, calculates the probability of counterfeiting and automatically sends a warning message to the related department when there is a high probability of counterfeiting.
49 Citations
11 Claims
-
1. An RF identification tag management method for controlling use of a non-powered RF-ID tag on a semiconductor chip, comprising:
-
receiving an inquiry from a terminal management server for analyzing RF-ID tag data read-out by radio and deciding the validity of said data;
searching a log database for storing RF-ID tag read-out records;
deciding whether or not there is a record of a past read-out of same said RF-ID tag data; and
verifying whether said RF-ID tag data is genuine and replies to said terminal management server. - View Dependent Claims (2, 3, 4)
-
-
5. An RF identification tag management method for controlling use of a non-powered RF-ID tag on a semiconductor chip, further comprising:
-
receiving data read out from the RF-ID tag by radio;
analyzing said RF-ID tag data and deciding the validity of said data; and
when determined said data is valid, outputting said RF-ID tag data to a connected management server and receiving verification results on whether there is a past read-out record of said same tag data. - View Dependent Claims (6, 7, 8, 9)
-
-
10. An RF identification tag management system for controlling use of a non-powered RF-ID tag on a semiconductor chip, wherein said system comprises a system operation server for unified control and monitoring of the multiple terminal management servers dispersed over a wide area;
- and said operation management server acquires all tag read-out information from all terminal management servers, and registers their logs in a log database.
- View Dependent Claims (11)
Specification