RFID tag access authentication system and RFID tag access authentication method
First Claim
1. An RFID tag access authentication system comprising:
- a data processing terminal, a memory medium; and
an RFID tag, wherein said data processing terminal comprises;
an input unit by which a first identification data is inputted to said data processing terminal, a first data processing unit which generates a request signal for requesting a first key data, a first communication unit which transmits said request signal to said memory medium, a second communication unit which transmits said first identification data and said first key data received from said memory medium to said RFID tag, and said first data processing unit accesses said RFID tag in response to receiving of an access authentication data from said RFID tag, said memory medium comprises;
a first memory unit which stores said first key data, and a third communication unit which transmits said first key data in said first memory unit to said data processing terminal in response to said request signal, said RFID tag comprises;
a second memory unit which stores a second identification data and a second key data corresponding to said second identification data, a second data processing unit which compares a first set of said first identification data and said first key data with a second set of said second identification data and said second key data in said second memory unit, and generates said access authentication data when said first set agrees with said second set, and a fourth communication unit which transmits said access authentication data to said data processing terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
An RFID tag access authentication system including a data processing terminal, a memory medium and a RFID tag. The data processing terminal generates a request signal for requesting a first key data, and transmits the request signal to the memory medium. The system transmits an inputted first identification data and the first key data received from the memory medium to the RFID tag. The system accesses the RFID tag in response to receiving of an access authentication data from the RFID tag. The RFID tag stores a second identification data and a second key data corresponding to the second identification data. The system compares a first set of the first identification data and the first key data with a second set of the second identification data and the second key data. Then, the system generates the access authentication data when the first set agrees with the second set.
-
Citations
10 Claims
-
1. An RFID tag access authentication system comprising:
-
a data processing terminal, a memory medium; and
an RFID tag, wherein said data processing terminal comprises;
an input unit by which a first identification data is inputted to said data processing terminal, a first data processing unit which generates a request signal for requesting a first key data, a first communication unit which transmits said request signal to said memory medium, a second communication unit which transmits said first identification data and said first key data received from said memory medium to said RFID tag, and said first data processing unit accesses said RFID tag in response to receiving of an access authentication data from said RFID tag, said memory medium comprises;
a first memory unit which stores said first key data, and a third communication unit which transmits said first key data in said first memory unit to said data processing terminal in response to said request signal, said RFID tag comprises;
a second memory unit which stores a second identification data and a second key data corresponding to said second identification data, a second data processing unit which compares a first set of said first identification data and said first key data with a second set of said second identification data and said second key data in said second memory unit, and generates said access authentication data when said first set agrees with said second set, and a fourth communication unit which transmits said access authentication data to said data processing terminal. - View Dependent Claims (2, 3)
-
-
4. An RFID tag access authentication system comprising:
-
a data processing terminal, a memory medium; and
an RFID tag, wherein said data processing terminal comprises;
an input unit by which a first identification data is inputted to said data processing terminal, a first data processing unit which generates a first request signal for requesting a first key data, and a second request signal for requesting a second identification data and a second key data corresponding to said second identification data, a first communication unit which transmits said first request signal to said memory medium, and receives said first key data from said memory medium, a second communication unit which transmits said second request signal to said RFID tag, and receives said second identification data and said second key data from said RFID tag, and said first data processing unit compares a first set of said first identification data and said first key data with a second set of said second identification data and said second key data, accesses said RFID tag when said first set agrees with said second set, and deletes said first key data, said second identification data and said second key data when said first set does not agree with said second set, said memory medium comprises;
a first memory unit which stores said first key data, and a third communication unit which transmits said first key data in said first memory unit to said data processing terminal in response to said first request signal, said RFID tag comprises;
a second memory unit which stores said second set of said second identification data and said second key data, a fourth communication unit which transmits said second set of said second identification data and said second key data in said second memory unit to said data processing terminal. - View Dependent Claims (5, 6)
-
-
7. An RFID tag access authentication method comprising the steps of:
-
(a) generating a request signal for requesting a first key data by a data processing terminal, in response to an inputted first identification data;
(b) transmitting said request signal to a memory medium by said data processing terminal;
(c) transmitting said first key data to said data processing terminal in response to said request signal by said memory medium;
(d) transmitting said first identification data and said first key data received from said memory medium to an RFID tag by said data processing terminal;
(e) comparing a first set of said first identification data and said first key data with a second set of a second identification data and a second key data stored in said RFID tag, and generating a access authentication data indicating an authentication for accessing said RFID tag when said first set agrees with said second set, by said RFID tag; and
(f) accessing said RFID tag in response to receiving of said access authentication data from said RFID tag by said data processing terminal.
-
-
8. An RFID tag access authentication method comprising the steps of:
-
generating a first request signal for requesting a first key data by a data processing terminal, in response to an inputted first identification data;
transmitting said first request signal to a memory medium by said data processing terminal;
transmitting said first key data to said data processing terminal in response to said first request signal by said memory medium;
generating a second request signal for requesting a second identification data and a second key data corresponding to said second identification data by said data processing terminal;
transmitting said second request signal to an RFID tag by said data processing terminal;
transmitting said second identification data and said second key data to said data processing terminal in response to said second request signal by said RFID tag;
comparing a first set of said first identification data and said first key data with a second set of said second identification data and said second key data by said data processing terminal; and
accessing said RFID tag when said first set agrees with said second set, and deleting said first key data, said second identification data and said second key data when said first set does not agree with said second set, by data processing terminal.
-
-
9. A computer program product embodied on a computer-readable medium and comprising code that, when executed, causes a computer to perform the following:
-
generating a request signal for requesting a first key data by a data processing terminal, in response to an inputted first identification data;
transmitting said request signal to a memory medium by said data processing terminal;
transmitting said first identification data and said first key data received from said memory medium to an RFID tag by said data processing terminal; and
accessing said RFID tag in response to receiving of an access authentication data from said RFID tag by said data processing terminal, wherein said RFID tag compares a first set of said first identification data and said first key data with a second set of a second identification data and a second key data stored in said RFID tag, and generates said access authentication data indicating an authentication for accessing said RFID tag when said first set agrees with said second set to transmit to said data processing terminal, by said RFID tag.
-
-
10. A computer program product embodied on a computer-readable medium and comprising code that, when executed, causes a computer to perform the following:
-
generating a first request signal for requesting a first key data by a data processing terminal, in response to an inputted first identification data;
transmitting said first request signal to a memory medium by said data processing terminal;
generating a second request signal for requesting a second identification data and a second key data corresponding to said second identification data by said data processing terminal;
transmitting said second request signal to an RFID tag by said data processing terminal;
comparing a first set of said first identification data and said first key data received from said memory medium with a second set of said second identification data and said second key data received from said RFID tag by said data processing terminal; and
accessing said RFID tag when said first set agrees with said second set, and deleting said first key data, said second identification data and said second key data when said first set does not agree with said second set, by said data processing terminal.
-
Specification