×

RFID tag, operating method of RFID tag and operating method between RFID tag and RFID reader

  • US 8,896,420 B2
  • Filed: 04/08/2009
  • Issued: 11/25/2014
  • Est. Priority Date: 04/16/2008
  • Status: Active Grant
First Claim
Patent Images

1. A radio frequency identification (RFID) tag, comprising:

  • a transmitting/receiving unit;

    a memory, configured for storing digital information, comprising;

    a first identification code;

    a second identification code;

    a set of data; and

    a password, being one of a predetermined value indicating that the set of data is not under protection or a value not equal to the predetermined value obtained by an encryption of the first identification code and the second identification code with a predetermined algorithm indicating that the set of data is under protection, wherein the predetermined value is assigned by the manufacture or determined by the design of the RFID tag, wherein the predetermined value is not received from an interrogating RFID reader and cannot be changed by a user during an operation; and

    a control unit, coupled to the transmitting/receiving unit and the memory, configured for performing a password verification procedure prior to access of the set of data under protection when the password is determined to be the value not equal to the predetermined value, checking whether a request for accessing the second identification code received by the transmitting/receiving unit comprises the first identification code, and transmitting the second identification code via the transmitting/receiving unit if the request for accessing the second identification code does comprise the first identification code, even when the password stored in the memory is determined to be the value not equal to the predetermined value and the password verification procedure fails;

    wherein the RFID tag is configured to operate in either an open mode dictating any RFID reader can access data stored therein, or a closed mode dictating said password verification procedure is required to access the set of data under protection.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×