摘要:
A first information-communication device generates first biometric pattern used for comparison based on user biometric information retrieved by a biometric sensor, and sends the generated first biometric pattern to a second biometric information-communication device. The second information-communication device compares the first biometric pattern sent from the first information-communication device with second biometric pattern, which is user biometric pattern stored in memory, and sends the second biometric pattern to the first information-communication device when the compared biometric pattern matches. The first information-communication device then stores the second biometric pattern sent from the second information-communication device.
摘要:
A first information-communication device generates first biometric pattern used for comparison based on user biometric information retrieved by a biometric sensor, and sends the generated first biometric pattern to a second biometric information-communication device. The second information-communication device compares the first biometric pattern sent from the first information-communication device with second biometric pattern, which is user biometric pattern stored in memory, and sends the second biometric pattern to the first information-communication device when the compared biometric pattern matches. The first information-communication device then stores the second biometric pattern sent from the second information-communication device.
摘要:
An information management system comprises information processing unit 51 which reads out self ID number data and reference ID number data from each RFID tag, and additionally writes all the self ID number data and reference ID number data into an ID table. The data in each row of the ID table is the self ID number data and reference ID number data that are stored in each RFID tag. “0” is set to all rows of a link flag setting region, and it is checked whether a value in the M-th row of the reference ID number data is equal to a value in the N-th row of the self ID number data. If both are equal, then “1” is set to the N-th row in the link flag setting region. These processing operations are repeated for all rows of the ID table.
摘要:
A management apparatus including a portable terminal identifying module to receive card information from a non-contact IC card processing unit having a module to communicate with an IC card without contact.
摘要:
A smart card and a settlement terminal are provided by which, when common-key cryptography is used for value transfer between smart cards, the security of the whole system can be improved by enabling easy updating of a cryptographic key used for the value transfer. A smart card transmits/receives value data to/from another smart card. The smart card includes an information accumulating unit for accumulating value data, a transfer key used to update the value data, and an update key used to update the transfer key; a communication unit for receiving a transfer key encrypted by use of the update key, the transfer key being transmitted from another smart card; and an arithmetic processing unit for decrypting the encrypted transfer key by use of the update key to update the transfer key accumulated in the information accumulating unit by use of the decrypted transfer key.
摘要:
In a portable terminal having an IC card, the outstanding SF value, the commuter pass information and the conditions for the corresponding operation to charge the SF value or renew the validity period of the commuter pass are stored in the IC card. The outstanding SF value and the validity period of the commuter pass are checked at a predetermined timing. In the case where the outstanding SF value and the validity period satisfy the conditions for the corresponding operation (in the case where the outstanding SF value is reduced to less than a predetermined amount, for example), the set corresponding operation is performed. Thus, a predetermined amount is charged against the outstanding SF value, or the oncoming expiry of the validity period of the commuter pass is notified. The conditions for the corresponding operation can be set and changed appropriately at the portable terminal.
摘要:
A wireless IC memory, for improving the security thereof, for achieving protection of business information and privacy, comprises an RFID tag 100, wherein it is possible to setup “readout disenabling (ReadLock)” condition to the UII code bank for storing ID data of the RFID tag 100, with a predetermined protocol from an external communication apparatus, within the RFID tag 100. Setup of “readout disenabling (ReadLock)” condition is stored on a readout enabling/disenabling condition memory portion 105 within the RFID tag 100. In case where the “readout disenabling (ReadLock)” condition is set up in the UII code bank, a protocol process controller portion 103 of the RFID tag 100, not responding the UII code, normally, but answers a fake UII code or an error code, or gives no answer, to a request or command of readout of the UII data from the external communication apparatus.
摘要:
A wireless IC memory, for improving the security thereof, for achieving protection of business information and privacy, comprises an RFID tag 100, wherein it is possible to setup “readout disenabling (ReadLock)” condition to the UII code bank for storing ID data of the RFID tag 100, with a predetermined protocol from an external communication apparatus, within the RFID tag 100. Setup of “readout disenabling (ReadLock)” condition is stored on a readout enabling/disenabling condition memory portion 105 within the RFID tag 100. In case where the “readout disenabling (ReadLock)” condition is set up in the UII code bank, a protocol process controller portion 103 of the RFID tag 100, not responding the UII code, normally, but answers a fake UII code or an error code, or gives no answer, to a request or command of readout of the UII data from the external communication apparatus.
摘要:
A hierarchical structure is established among a plurality of RFID tags, such that ID numbers can be read only from RFID tags which belong to a particular layer. RFID tag can control whether permission should be given to read its ID number therefrom to protect the ID number. Data held in the RFID tag can be read from the outside. RFID tag comprises a memory circuit having a function of holding data, and a logic circuit having a function of processing a control command received from outside. Memory circuit stores an own ID nmber for identifying the RFID tag itself, and a parent ID number for identifying a second RFID tag. When RFID tag receives an ID number read command which contains first data as a parameter from outside, the logic circuit outputs the own ID number to outside only when the first data matches the parent ID number.
摘要:
For making difficult to copy data of a RFID tag, while enabling to detect it when copying the data, easily, but without exerting ill influences upon the existing specification thereof, within the RFID tag 100 is provided a readout exclusive bank, other than banks provided in accordance with the existing specification. RFID identification information is stored into the readout exclusive bank of the RFID tag 100, when the RFID tag 100 is shipped out of a maker. A user who wishes to guarantee properness of UII data produces cryptograph calculation result data through encrypting the RFID identification information and the UII data, when writing the UII data into the RFID tag 100, and stores the cryptograph calculation result data into a USER bank within the RFID tag 100. Other users, who wish to read out the UII data from the RFID tag 100, read out the RFID identification information and the UII data from the RFID tag 10, so as to conduct cryptography calculation thereon, and can make determination on whether the data stored in the RFID tag is proper one or not, by making a check upon coincidence between the calculation result and the calculation result data stored in the RFID tag 100.