摘要:
A wireless IC memory, for improving the security thereof, for achieving protection of business information and privacy, comprises an RFID tag 100, wherein it is possible to setup “readout disenabling (ReadLock)” condition to the UII code bank for storing ID data of the RFID tag 100, with a predetermined protocol from an external communication apparatus, within the RFID tag 100. Setup of “readout disenabling (ReadLock)” condition is stored on a readout enabling/disenabling condition memory portion 105 within the RFID tag 100. In case where the “readout disenabling (ReadLock)” condition is set up in the UII code bank, a protocol process controller portion 103 of the RFID tag 100, not responding the UII code, normally, but answers a fake UII code or an error code, or gives no answer, to a request or command of readout of the UII data from the external communication apparatus.
摘要:
A wireless IC memory, for improving the security thereof, for achieving protection of business information and privacy, comprises an RFID tag 100, wherein it is possible to setup “readout disenabling (ReadLock)” condition to the UII code bank for storing ID data of the RFID tag 100, with a predetermined protocol from an external communication apparatus, within the RFID tag 100. Setup of “readout disenabling (ReadLock)” condition is stored on a readout enabling/disenabling condition memory portion 105 within the RFID tag 100. In case where the “readout disenabling (ReadLock)” condition is set up in the UII code bank, a protocol process controller portion 103 of the RFID tag 100, not responding the UII code, normally, but answers a fake UII code or an error code, or gives no answer, to a request or command of readout of the UII data from the external communication apparatus.
摘要:
An information management system comprises information processing unit 51 which reads out self ID number data and reference ID number data from each RFID tag, and additionally writes all the self ID number data and reference ID number data into an ID table. The data in each row of the ID table is the self ID number data and reference ID number data that are stored in each RFID tag. “0” is set to all rows of a link flag setting region, and it is checked whether a value in the M-th row of the reference ID number data is equal to a value in the N-th row of the self ID number data. If both are equal, then “1” is set to the N-th row in the link flag setting region. These processing operations are repeated for all rows of the ID table.
摘要:
For making difficult to copy data of a RFID tag, while enabling to detect it when copying the data, easily, but without exerting ill influences upon the existing specification thereof, within the RFID tag 100 is provided a readout exclusive bank, other than banks provided in accordance with the existing specification. RFID identification information is stored into the readout exclusive bank of the RFID tag 100, when the RFID tag 100 is shipped out of a maker. A user who wishes to guarantee properness of UII data produces cryptograph calculation result data through encrypting the RFID identification information and the UII data, when writing the UII data into the RFID tag 100, and stores the cryptograph calculation result data into a USER bank within the RFID tag 100. Other users, who wish to read out the UII data from the RFID tag 100, read out the RFID identification information and the UII data from the RFID tag 10, so as to conduct cryptography calculation thereon, and can make determination on whether the data stored in the RFID tag is proper one or not, by making a check upon coincidence between the calculation result and the calculation result data stored in the RFID tag 100.
摘要:
In order to provide a highly secure system at a low cost without providing a complicated logic circuit for an RFID tag, in a system including an RFID tag (10) and a interrogator (20), the interrogator (10) is provided with a password creating unit (1100) which computes an electronic key (131) and a keyword unique to the RFID tag with a predetermined irreversible function to create a password. By using the password as a key, item information of an item attached with the RFID tag (20) is encrypted with a predetermined encryption function. The encrypted item information and the keyword are written to the RFID tag (20). The interrogator (10) reads the encrypted item information and the keyword from the RFID tag (20), causes the password creating unit (1100) to compute the password by using the keyword, and uses the password as a key to decrypt the read encrypted item information.
摘要:
In an electronic tag data read/write apparatus, an electronic tag receives a response request from a reader/writer, generates a random number in a random number generator, stores the random number in a memory, and transmits the generated random number to the reader/writer. The reader/writer conducts masking processing on write data on the basis of the random number every size of the received random number, repeats the masking processing until all of the write data are subjected to masking processing, and then transmits the masked write data to the electronic tag collectively. The electronic tag conducts deciphering processing on the received masked write data every size of the random number stored in the memory, repeats the deciphering processing until all of the masked write data are deciphered, and writes the write data into the memory.
摘要:
An IC tag system is provided which can perform transfer of a method of accessing an IC tag and assure data validity of the IC tag only between authorized users. The IC tag system comprises a data write-in device including a password encryption unit (130), a signature generation unit (140) and a data write-in unit (150) operative to communicate with the IC tag (30) to write in data and an encrypted password in the IC tag (30) and set the limitation on access to the data written in the IC tag (30) by the aid of the password, and a data read-in device including a password decryption unit (230), a signature authentication unit (240) and a data read-in unit (250) operative to communicate with the IC tag (30) to read in the data and the encrypted password from the IC tag (30) and release the limitation on access to the data by the aid of the decrypted password.
摘要:
In a charging control system, electrically-driven vehicles whose charging levels are lower than such a charging level required to drive these electrically-driven vehicles over a necessary minimum drivable distance are charged with a priority, and such an electrically-driven vehicle whose charging level quickly reaches the above-explained charging level among these electrically-driven vehicles is charged with a top priority. Also, in the charging control system, an order for dynamically charging vehicle-purpose batteries is rearranged by monitoring a change in charging environments, for instance, an electrically-driven vehicle is newly coupled to a charger in a half way; a commonly available electric power amount is increased by solar power generation etc.; and a supplyable electric power amount (W) is lowered due to utilization of electricity by a subject other than electrically-driven vehicles.
摘要:
A pulse current from a pulse current supply side is fed to a middle part of an anode holding body to which anodes are connected; both end portions of a cathode holding body, to which cathodes are connected, are connected to a negative pole on the pulse power source side; and inductances of wiring between adjacent anodes and inductances of wiring between adjacent cathodes are set at a ratio of 1:2:3:4 in a direction of spacing from a connection to the pulse power source side. Pulse currents are equally fed to each work and it can be ensured that chromium plating treatment of each work is made equal.
摘要:
An individual article management arrangements for managing an individual article distributed through a plurality of sites with a form thereof changed at least one of said plurality of sites, including: information processing apparatuses installed at said plurality of sites; and a data center apparatus connected to each of said information processing apparatuses through a network. The data center apparatus and the information processing apparatuses are configured to effect predetermined operations.