Radio frequency identification system and method
First Claim
1. A radio frequency identification system comprising:
- a radio frequency identification tag having an identification code and a set of verifiable data stored therein; and
a radio frequency identification reader which sends a reading request to the radio frequency identification tag, requesting to read a first portion of the set of verifiable data,wherein the radio frequency identification tag further comprises a controller, which, if the radio frequency identification tag receives the reading request from the radio frequency identification reader, and if a locking operation has not been performed on a second portion of the set of verifiable data, then the controller controls the locking operation to be performed on the second portion of the set of verifiable data, so that, from then on, any data of the second portion of the set of verifiable data cannot be read,wherein the set of verifiable data includes n digital signatures SIG1, SIG2, . . . , SIGn, the first portion of the set of verifiable data includes k digital signatures of the n digital signatures, and the second portion of the set of verifiable data includes q digital signatures of the n digital signatures, andwherein k=n*0.5 if n is even; and
k=n*0.5+0.5 or k=n*0.5-0.5 if n is odd.
1 Assignment
0 Petitions
Accused Products
Abstract
A radio frequency identification system, including: a radio frequency identification tag having an identification code and a set of verifiable data stored therein; and a radio frequency identification reader which sends a reading request to the radio frequency identification tag, requesting to read a first portion of the set of verifiable data, wherein the radio frequency identification tag further comprising control means, which, when the radio frequency identification tag receives the reading request from the radio frequency identification reader, in case of that the set of verifiable data has not been performed a locking operation, performs the locking operation on the set of verifiable data, so that from then on any data of a second portion of the set of verifiable data cannot be read.
-
Citations
12 Claims
-
1. A radio frequency identification system comprising:
-
a radio frequency identification tag having an identification code and a set of verifiable data stored therein; and a radio frequency identification reader which sends a reading request to the radio frequency identification tag, requesting to read a first portion of the set of verifiable data, wherein the radio frequency identification tag further comprises a controller, which, if the radio frequency identification tag receives the reading request from the radio frequency identification reader, and if a locking operation has not been performed on a second portion of the set of verifiable data, then the controller controls the locking operation to be performed on the second portion of the set of verifiable data, so that, from then on, any data of the second portion of the set of verifiable data cannot be read, wherein the set of verifiable data includes n digital signatures SIG1, SIG2, . . . , SIGn, the first portion of the set of verifiable data includes k digital signatures of the n digital signatures, and the second portion of the set of verifiable data includes q digital signatures of the n digital signatures, and wherein k=n*0.5 if n is even; and
k=n*0.5+0.5 or k=n*0.5-0.5 if n is odd.
-
-
2. A radio frequency identification system comprising:
-
a radio frequency identification tag having an identification code and a set of verifiable data stored therein; and a radio frequency identification reader which sends a reading request to the radio frequency identification tag, requesting to read a first portion of the set of verifiable data, wherein the radio frequency identification tag further comprises a controller, which, if the radio frequency identification tag receives the reading request from the radio frequency identification reader, and if a locking operation has not been performed on a second portion of the set of verifiable data, then the controller controls the locking operation to be performed on the second portion of the set of verifiable data, so that, from then on, any data of the second portion of the set of verifiable data cannot be read, wherein the set of verifiable data includes n digital signatures SIG1, SIG2, . . . , SIGn, the first portion of the set of verifiable data includes k digital signatures of the n digital signatures, and the second portion of the set of verifiable data includes q digital signatures of the n digital signatures, and wherein each digital signature SIGi of the n digital signatures SIG1, SIG2, . . . , SIGn takes a form of (Si, C), including a portion Si and a portion C, i=1, . . . , n, and all digital signatures of the n digital signatures share one common portion C. - View Dependent Claims (3, 4)
-
-
5. A radio frequency identification tag having an identification code and a set of verifiable data stored therein,
wherein the radio frequency identification tag further comprises a controller, which, if the radio frequency identification tag receives a reading request that requests to read a first portion of the set of verifiable data, and if a locking operation has not been performed on a second portion of the set of verifiable data, then the controller controls the locking operation to be performed on the second portion of the set of verifiable data, so that, from then on, any data of the second portion of the set of verifiable data cannot be read, wherein the set of verifiable data includes n digital signatures SIG1, SIG2, . . . , SIGn, the first portion of the set of verifiable data includes k digital signatures of the n digital signatures, and the second portion of the set of verifiable data includes q digital signatures of the n digital signatures, and wherein k=n*0.5 if n is even; - and k=n*0.5+0.5 or k=n*0.5-0.5 if n is odd.
-
6. A radio frequency identification tag having an identification code and a set of verifiable data stored therein,
wherein the radio frequency identification tag further comprises a controller, which, if the radio frequency identification tag receives a reading request that requests to read a first portion of the set of verifiable data, and if a locking operation has not been performed on a second portion of the set of verifiable data, then the controller controls the locking operation to be performed on the second portion of the set of verifiable data, so that, from then on, any data of the second portion of the set of verifiable data cannot be read, wherein the set of verifiable data includes n digital signatures SIG1, SIG2, . . . , SIGn, the first portion of the set of verifiable data includes k digital signatures of the n digital signatures, and the second portion of the set of verifiable data includes q digital signatures of the n digital signatures, and wherein each digital signature SIGi of the n digital signatures SIG1, SIG2, . . . , SIGn takes a form of (Si, C), including a portion Si and a portion C, i=1, . . . , n, and all digital signatures of the n digital signatures share one common portion C.
-
9. A radio frequency identification method comprising:
-
storing an identification code and a set of verifiable data in a radio frequency identification tag; and a radio frequency identification reader sending a reading request to the radio frequency identification tag, requesting to read a first portion of the set of verifiable data, wherein the radio frequency identification tag, upon receiving the reading request from the radio frequency identification reader, if a locking operation has not been performed on a second portion of the set of verifiable data, then the radio frequency identification tag performs the locking operation on the second portion of the set of verifiable data, so that, from then on, any data of the second portion of the set of verifiable data cannot be read, wherein the set of verifiable data includes n digital signatures SIG1, SIG2, . . . , SIGn, the first portion of the set of verifiable data includes k digital signatures of the n digital signatures, and the second portion of the set of verifiable data includes q digital signatures of the n digital signatures, and wherein k=n*0.5 if n is even; and
k=n*0.5+0.5 or k=n*0.5-0.5 if n is odd.
-
-
10. A radio frequency identification method comprising:
-
storing an identification code and a set of verifiable data in a radio frequency identification tag; and a radio frequency identification reader sending a reading request to the radio frequency identification tag, requesting to read a first portion of the set of verifiable data, wherein the radio frequency identification tag, upon receiving the reading request from the radio frequency identification reader, if a locking operation has not been performed on a second portion of the set of verifiable data, then the radio frequency identification tag performs the locking operation on the second portion of the set of verifiable data, so that, from then on, any data of the second portion of the set of verifiable data cannot be read, wherein the set of verifiable data includes n digital signatures SIG1, SIG2, . . . , SIGn, the first portion of the set of verifiable data includes k digital signatures of the n digital signatures, and the second portion of the set of verifiable data includes q digital signatures of the n digital signatures, and wherein each digital signature SIGi of the n digital signatures SIG1, SIG2, . . . , SIGn takes a form of (Si, C), including a portion Si and a portion C, i=1, . . . , n, and all digital signatures of the n digital signatures share one common portion C. - View Dependent Claims (11, 12)
-
Specification