RFID Tag, Operating Method of RFID Tag and Operating Method between RFID Tag and RFID Reader
First Claim
1. A radio frequency identification (RFID) tag, comprising:
- a transmitting/receiving unit;
a memory for storing a first identification code, a second identification code, a password, and a set of data, wherein if the set of data is under protection, then a password verification procedure corresponding to the password is required; and
a control unit, coupled to the transmitting/receiving unit and the memory, for checking whether a request for accessing the second identification code received by the transmitting/receiving unit comprises the first identification code, and transmitting the second identification code via the transmitting/receiving unit if the request for accessing the second identification code does comprise the first identification code, regardless that the set of data is under protection and the password verification procedure fails.
3 Assignments
0 Petitions
Accused Products
Abstract
An RFID tag including a transmitting/receiving unit, a memory and a control unit. A first identification code, a second identification code, a password, and a set of data are stored in the memory. If the set of data is under protection, the set of data is accessible only when a verification procedure corresponding to the password is successfully performed. If the transmitting/receiving unit receives a request for accessing the second identification code, the control unit shall check whether the request includes the first identification code. As long as the checking result of the control unit is yes, even if the set of data is under protection and the verification procedure fails or the verification procedure is not successfully performed, the control unit shall still transmit the second identification code via the transmitting/receiving unit.
-
Citations
20 Claims
-
1. A radio frequency identification (RFID) tag, comprising:
-
a transmitting/receiving unit; a memory for storing a first identification code, a second identification code, a password, and a set of data, wherein if the set of data is under protection, then a password verification procedure corresponding to the password is required; and a control unit, coupled to the transmitting/receiving unit and the memory, for checking whether a request for accessing the second identification code received by the transmitting/receiving unit comprises the first identification code, and transmitting the second identification code via the transmitting/receiving unit if the request for accessing the second identification code does comprise the first identification code, regardless that the set of data is under protection and the password verification procedure fails. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An operating method of an RFID tag stored a first identification code, a second identification code, a password, and a set of data, the set of data being accessible when a password verification procedure corresponding to the password is successfully performed while being under protection, the operating method comprising steps of:
-
(a) receiving a request for accessing the second identification code; (b) checking whether the request comprises the first identification code; and (c) transmitting the second identification code when the step (b) is yes, regardless that the set of data is under protection and the verification procedure fails. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An operating method between an RFID tag and an RFID reader, wherein the RFID tag stores a first identification code, a second identification code, a password, and a set of data, wherein the data is accessible when a password verification procedure is successfully performed while being under protection, the operating method comprising steps of:
-
(a) transmitting a second-identification-code request for accessing from the RFID reader; (b) receiving the second-identification-code request by the RFID tag and determining whether the second-identification-code request comprises the first identification code; and (c) transmitting the second identification code from the RFID tag to the RFID reader if the step (b) is yes, regardless that the set of data is under protection and the password verification procedure fails. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification