Wireless tag system, wireless tag access control device, wireless tag access control method, wireless tag access control program and wireless tag
First Claim
1. A wireless tag system comprising:
- a plurality of wireless slave tags which store tag data encrypted by means of a first key of cryptograph;
a plurality of wireless master tags, each which store the first keys of cryptograph encrypted by means of the second key of cryptograph; and
a wireless tag access control device which accesses each of said master tags and decrypting said first keys of cryptograph acquired from said master tags by means of said second key of cryptograph and then said tag data acquired from said slave tags by means of the decrypted first keys of cryptograph.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless tag system and a wireless tag access control device make it easy to keep and manage keys of cryptograph with an enhanced level of security. The wireless tag system comprises a plurality of wireless slave tags 1 through 3 which store information encrypted by means of a first key of cryptograph, a wireless master tag 7A which store the first keys of cryptograph of the slave tags belonging thereto encrypted by means of the second key of cryptograph and a wireless tag access control device which accesses the master tag 7A and decrypting the first keys of cryptograph acquired from the master tag 7A by means of the second key of cryptograph and then the tag data acquired from the slave tags 1 through 3 by means of the decrypted first keys of cryptograph.
40 Citations
17 Claims
-
1. A wireless tag system comprising:
-
a plurality of wireless slave tags which store tag data encrypted by means of a first key of cryptograph;
a plurality of wireless master tags, each which store the first keys of cryptograph encrypted by means of the second key of cryptograph; and
a wireless tag access control device which accesses each of said master tags and decrypting said first keys of cryptograph acquired from said master tags by means of said second key of cryptograph and then said tag data acquired from said slave tags by means of the decrypted first keys of cryptograph. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A wireless tag access control device adapted to access a plurality of wireless tags including slave tags which store tag data encrypted by means of the first keys of cryptograph and a plurality of master tags which store slave-tag-related information including the UIDs of the slave tags and said first keys of cryptograph, at least said first keys of cryptograph being encrypted by means of the second keys of cryptograph, said device comprising:
-
a master tag information acquiring section which accesses said master tags and acquiring the slave-tag-related information stored in said master tags;
a first decrypting section which decrypts the information encrypted by means of said second keys of cryptograph out of said slave-tag-related information acquired by said master tag information acquiring section by means of the second keys of cryptograph acquired to correspond to said master tags;
a slave tag data acquiring section which accesses said slave tags by means of said UIDs of the slave tags acquired by said master tag information acquiring section or decrypted and acquired by said first decrypting section and acquiring the tag data encrypted by means of said first keys of cryptograph; and
a second decrypting section which decrypts the tag data acquired by said slave tag data acquiring section by means of the first keys of cryptograph decrypted by means of said first decrypting section. - View Dependent Claims (11)
-
-
12. A wireless tag access control method adapted to access a plurality of wireless tags including slave tags which store tag data encrypted by means of the first keys of cryptograph and a plurality of master tags which store slave-tag-related information including the UIDs of the slave tags and said first keys of cryptograph, at least said first keys of cryptograph being encrypted by means of the second keys of cryptograph, said method comprising:
-
a master tag information acquiring step which accesses said master tags and acquiring the slave-tag-related information stored in said master tags;
a first decrypting step which decrypts the information encrypted by means of said second keys of cryptograph out of said slave-tag-related information acquired in said master tag information acquiring step by means of the second keys of cryptograph acquired to correspond to said master tags;
a slave tag data acquiring step which accesses said slave tags by means of said UIDs of the slave tags acquired in said master tag information acquiring step and acquiring the tag data encrypted by means of said first keys of cryptograph; and
a second decrypting step which decrypts the tag data acquired in said slave tag data acquiring step by means of the first keys of cryptograph decrypted in said first decrypting step. - View Dependent Claims (13)
-
-
14. A wireless tag access control program which drives a computer to execute a wireless tag access control method adapted to access a plurality of wireless tags including slave tags which store tag data encrypted by means of the first keys of cryptograph and a plurality of master tags which store slave-tag-related information including the UIDs of the slave tags and said first keys of cryptograph, at least said first keys of cryptograph being encrypted by means of the second keys of cryptograph, said program comprising:
-
a master tag information acquiring step which accesses said master tags and acquiring the slave-tag-related information stored in said master tags;
a first decrypting step which decrypts the information encrypted by means of said second keys of cryptograph out of said slave-tag-related information acquired in said master tag information acquiring step by means of the second keys of cryptograph acquired to correspond to said master tags;
a slave tag data acquiring step which accesses said slave tags by means of said UIDs of the slave tags acquired in said master tag information acquiring step or decrypted and acquired in said first decrypting step and acquiring the tag data encrypted by means of said first keys of cryptograph; and
a second decrypting step which decrypts the tag data acquired in said slave tag data acquiring step by means of the first keys of cryptograph decrypted in said first decrypting step. - View Dependent Claims (15)
-
-
16. A wireless tag comprising a wireless antenna and a memory section and adapted to be accessed by a read/write device by means of a wireless signal;
-
said memory section which store;
UIDs relating to other wireless tags accessible for said read/write device; and
the first keys of cryptograph which decrypts the tag data stored in the wireless tags having said UIDs and encrypted by means of the second keys of cryptograph. - View Dependent Claims (17)
-
Specification