Method and system for identifying and managing radio frequency identification (RF-ID) attached objects
First Claim
1. An RF-ID (Radio Frequency Identification) tag management method for authenticating an RF-ID tag attached to merchandise, comprising:
- reading tag data from the RF-ID tag by a first ID-reader, and reporting the tag data to a system operation server with a first process ID assigned to the first ID-reader;
registering the first process ID as being related to an identification number of the tag data in a log database on the system operation server;
searching the log database for a second process ID which is the most recently recorded process ID as being related to the identification number; and
detecting a counterfeit RF-ID tag by determining whether a transition from a second process indicated by the second process ID to a first process indicated by the first process ID is possible as compared with process transition rules which are used to determine whether transitions between processes performed in an overall business system are possible or not,wherein each of the first process and the second process indicates one of the processes in the overall business system, andwherein process IDs, including the first process ID and the second process ID, are numbers indicating which of the processes in the overall business system have been performed on the merchandise.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention discloses a method and system for making losses due to the counterfeiting of RF-ID tags to a minimum, enhancing the reliability of RF-ID tag read-out and improving the overall reliability of the RF-ID tag system. An ID reader for communicating by radio with the RF-ID tag and reading tag data from the RF-ID tag transmits the data read-out results to a terminal management server connected to the ID reader. The terminal management server decodes the error correction signal from the read-out result data, also extracts the identification number section from the tag, and decides whether or not that identification number is valid. When determined to be a valid identification number, an inquiry is made to the system operation server connected over the network to find out if that identification number was previously read out and if that identification number might be counterfeit. The system operation server then refers to the log database, the blacklist database and process transition rule, calculates the probability of counterfeiting and automatically sends a warning message to the related department when there is a high probability of counterfeiting.
-
Citations
10 Claims
-
1. An RF-ID (Radio Frequency Identification) tag management method for authenticating an RF-ID tag attached to merchandise, comprising:
-
reading tag data from the RF-ID tag by a first ID-reader, and reporting the tag data to a system operation server with a first process ID assigned to the first ID-reader; registering the first process ID as being related to an identification number of the tag data in a log database on the system operation server; searching the log database for a second process ID which is the most recently recorded process ID as being related to the identification number; and detecting a counterfeit RF-ID tag by determining whether a transition from a second process indicated by the second process ID to a first process indicated by the first process ID is possible as compared with process transition rules which are used to determine whether transitions between processes performed in an overall business system are possible or not, wherein each of the first process and the second process indicates one of the processes in the overall business system, and wherein process IDs, including the first process ID and the second process ID, are numbers indicating which of the processes in the overall business system have been performed on the merchandise. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An RF-ID (Radio Frequency Identification) tag management method for authenticating a RF-ID tag attached to paper currency, comprising:
-
reading tag data from the RF-ID tag by a first ID-reader and reporting the tag data to a system operation server with a first process ID assigned to the first ID-reader; registering the first process ID as being related to an identification number of the tag data in a log database on the system operation server; searching the log database for a second process ID which is the most recently recorded process ID as being related to the identification number for the tag data; and detecting a counterfeit RF-ID tag by determining whether a transition from a second process indicated by the second process ID to a first process indicated by the first process ID is possible as compared with process transition rules which are used to determine whether transitions between processes performed in an overall business system are possible or not, wherein each of the first process and the second process indicates one of the processes in the overall business system, and wherein the process IDs, including the first process ID and the second process ID, are numbers indicating which of the processes in the overall business system have been performed on the merchandise. - View Dependent Claims (7)
-
-
8. A method for detecting a counterfeit of an RF-ID (Radio Frequency Identification) tag comprising:
-
reading an identification number from an RF-ID tag by a first reader; reporting the identification number with a first process ID from the first reader to a log database in a system operation server; registering the first process ID, a read-out date and a read-out time as being related to the identification number in the log database; reading an identification number from an RF-ID tag by a second reader; reporting the identification number with a second process ID from the second reader to a log database in the system operation server; and retrieving the first process ID with the identification number from the log database and detecting a counterfeit RF-ID tag by determining whether a transition from a first process indicated by the first process ID to a second process indicated by the second process ID is possible as compared with process transition rules which are used to determine whether transitions between processes performed in an overall business system are possible or not, wherein each of the first process and the second process indicates one of processes in the overall business system, and wherein process IDs, including the first process ID and the second process ID, are numbers indicating which of the processes in the overall business system have been performed on the merchandise. - View Dependent Claims (9, 10)
-
Specification