WO2007107417A1 - Method and systems for limiting repeated accesses to an electronic device - Google Patents

Method and systems for limiting repeated accesses to an electronic device Download PDF

Info

Publication number
WO2007107417A1
WO2007107417A1 PCT/EP2007/051457 EP2007051457W WO2007107417A1 WO 2007107417 A1 WO2007107417 A1 WO 2007107417A1 EP 2007051457 W EP2007051457 W EP 2007051457W WO 2007107417 A1 WO2007107417 A1 WO 2007107417A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
counter
delay
value
rfid
Prior art date
Application number
PCT/EP2007/051457
Other languages
French (fr)
Inventor
Frederic Bauchot
Pierre Secondo
Jean-Yves Clement
Gerard Marmigere
Original Assignee
International Business Machines Corporation
Compagnie Ibm France
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corporation, Compagnie Ibm France filed Critical International Business Machines Corporation
Priority to EP07712221A priority Critical patent/EP1997058A1/en
Priority to JP2009500797A priority patent/JP2009530727A/en
Publication of WO2007107417A1 publication Critical patent/WO2007107417A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Definitions

  • the present invention relates generally to the methods and systems for controlling the access to data stored within electronic devices and more specifically to a method and systems for limiting repeated attempts to access electronic devices .
  • the system comprises a first device for receiving from a payor a request to create a check having a radio frequency identifier (RFID) tag associated therewith.
  • RFID Radio Frequency Identifier
  • a second device is provided for receiving from a payee a request to validate a check having an RFID tag associated therewith.
  • the system further comprises an RFID repository.
  • a processor for (i) receiving check information from the payor, (ii) updating the RFID repository with check information received from the payor, (iii) receiving scanned check information from the payee, (iv) comparing the scanned check information received from the payee with certain information retrieved from the RFID repository, and (v) determining if the check is valid based upon the comparison of the scanned check information received from the payee with the certain information retrieved from the RFID repository.
  • the RFID repository comprises a central RFID repository.
  • U.S. Patent 6,226,619 discloses a method and system for preventing counterfeiting of an item, including an answering tag attached to the item. The item includes visible indicia for comparison with secret, non-duplicable information stored in the tag designating authenticity.
  • these methods and systems it is possible to ensure that a given document has been issued by the relevant person, or that an item has been manufactured by the relevant manufacturer, or that a given official document has been issued by the relevant administration.
  • these methods and systems are based upon identifiers encoded within the RFIDs however, such identifiers can be duplicated on other RFIDs using a RFID scanner and writer.
  • Electronic tags such as passive RFID are typical examples of electronic devices which are not equipped with a permanent power source. As mentioned above, such devices may play an important role in many fields, such as security enforcement. Indeed they can record secret information that a hacker may try to crack.
  • One of the easiest and most common strategies followed by hackers is to trigger the RFID tag logic by a sequence of different inputs X 1 , to collect the sequence of returned information F(X 1 ), hopping that the set of samples (X 1 , F(X 1 )) allows to partially or completely "reverse engineer" the function F that hides the secret information . Therefore, there is a need for a method and systems for limiting the risk of reverse engineering the logic imbedded within the chip of an electronic tag such as an RFID.
  • - counter resetting means adapted to maintain the value of said counting means for a predetermined delay after the power off of said system; and, - logic access means adapted to increase the value of said counting means each time an access is done to said electronic device and to idle said electronic device for a delay depending upon the value of said counting means;
  • Figure 1 depicts an example of the architecture of a passive RFID tag.
  • Figure 2 comprises figures 2a and 2b.
  • Figure 2a shows an RFID system with a reader having an antenna and an RFID tag having a dipole antenna.
  • Figure 2b illustrates the signal emitted by the antenna of the reader and the modulated signal reflected by the RFID tag.
  • Figure 3 illustrates an example of a passive RFID according to the invention for limiting the repeated accesses to the data of the tag.
  • Figure 4 shows an example of the logic associated to the access circuit of the RFID depicted on figure 3.
  • the time needed to collect a given number of samples (X 1 , F(X 1 )) upon which hackers rely to crack a secret information hidden in the function F is extended.
  • the core of any RFID system is the 'Tag' or 'Transponder', which can be attached to or embedded within objects, wherein data can be stored.
  • An RFID reader generi- cally referred to as reader in the following description, sends out a radio frequency signal to the RFID tag that broadcasts back its stored data to the reader.
  • the system works basically as two separate antennas, one on the RFID tag and the other on the reader.
  • the read data can either be transmitted directly to another system like a host computer through standard interfaces, or it can be stored in a portable reader and later uploaded to the computer for data processing.
  • An RFID tag system works effectively in environments with excessive dirt, dust, moisture, and/or poor visibility. It generally overcomes the limitations of other automatic identification approaches.
  • RFID tags do not require battery for transmission since generally, they are powered by the reader using an induction mechanism (an electromagnetic field is emitted by the reader antenna and received by an antenna localized on the RFID tag) . This power is used by the RFID tag to transmit a signal back to the reader, carrying the data stored in the RFID tag.
  • Active RFID tags comprise a battery to transmit a signal to a reader. A signal is emitted at a predefined interval or transmit only when addressed by a reader.
  • a passive High Frequency (HF) RFID tag When a passive High Frequency (HF) RFID tag is to be read, the reader sends out a power pulse e.g., a 134.2KHz power pulse, to the RFID antenna.
  • the magnetic field generated is 'collected' by the antenna in the RFID tag that is tuned to the same frequency. This received energy is rectified and stored on a small capacitor within the RFID tag.
  • the RFID tag When the power pulse has finished, the RFID tag immedi- ately transmits back its data, using the energy stored within its capacitor as its power source.
  • 128 bits, including error detection information are transmitted over a period of 20ms. This data is picked up by the receiving antenna and decoded by the reader.
  • the storage capacitor is discharged, resetting the RFID tag to make it ready for the next read cycle.
  • the period between transmission pulses is known as the 'sync time' and lasts between 20ms and 50ms depending on the system setup.
  • the transmission technique used between the RFID tag and the reader is Frequency Shift Keying (FSK) with transmissions generally comprised between 124.2kHz and 134.2kHz. This approach has comparatively good resistance to noise while also being very cost effective to implement. Many applications require that RFID tag attached to objects be read while traveling at specific speeds by a readout antenna .
  • FSK Frequency Shift Keying
  • RFID tags can be read-only, write-once, or read-write.
  • a read-only RFID tag comprises a read-only memory that is loaded during manufacturing process. Its content can not be modified.
  • the write-once RFID tags differ from the readonly RFID tags in that they can be programmed by the end-user, with the required data e.g., part number or serial number.
  • the read-write RFID tags allow for full read-write capability, allowing a user to update information stored in a tag as often as possible in the limit of the memory technology. Generally, the number of write cycles is limited to about 500,000 while the number of read cycles is not limited.
  • a detailed technical analysis of RFID tag is disclosed e.g., in RFID (McGraw-Hill Networking Professional) by Steven Shepard, edition Hardcover.
  • Figure 1 depicts an example of the architecture of a passive HF or Ultra High Frequency (UHF) RFID tag 100.
  • the dipole antenna comprising two parts 105-1 and 105-2 is connected to a power generating circuit 110 that provides current from received signal to the logic and memory circuit 115, to the demodulator 120, and to the modulator 125.
  • the input of demodulator 120 is connected to the antenna (105-1 and 105-2) for receiving the signal and for transmitting the received signal to the logic and memory circuit 115, after having demodulated the received signal.
  • the input of modulator 125 is connected to the logic and memory circuit 115 for receiving the signal to be transmitted.
  • the output of modulator 125 is connected to the antenna (105-1 and 105-2) for transmitting the signal after it has been modulated in modulator 125.
  • the architecture of a semi-passive RFID tag is similar to the one represented on figure 1, the main difference being the presence of a power supply that allows it to function with much lower signal power levels, resulting in greater reading distances.
  • Semi-passive tags do not have an integrated transmitter contrarily to active tags that comprise a battery and an active transmitter allowing them to generate high frequency energy and to apply it to the antenna .
  • FIG 2 shows an RFID system 200.
  • RFID system 200 comprises a reader 205 having an antenna 210.
  • the antenna 210 emits a signal 215 that is received by an RFID tag 220.
  • Signal 215 is reflected in RFID tag 220 and re-emitted as illustrated with dotted lines referred to as 225.
  • Figure 2b illustrates the signal 215 emitted by the antenna 210 of the reader 205 and the signal 225 reflected by the RFID tag 220.
  • the reflected signal 225 is modulated.
  • FIG. 3 illustrates an example of a passive RFID 300 according to the invention for limiting the repeated accesses to the data of the tag.
  • RFID 300 comprises a logic circuit 305, an access circuit 310, and an antenna 315.
  • the logic circuit 300 includes the conventional logic 320 and the new access logic 325.
  • the access circuit 310 includes a diode 330 to enforce capacitor 335 discharge direction, and a leaking resistor 340 with high resistivity. Typically the time T needed to discharge the capacitor would be of several orders of magnitude above the time duration for running the conventional logic.
  • the access circuit 310 further includes a reset counter circuit 345, the role of which is to reset (fill with zeros) the counter 350 when powered off, after the capacitor 335 is discharged.
  • the size of the counter 350 depends upon the implementation. This counter can count within a range from zero to C max . Within this range are defined a set of thresholds C 1 . For each threshold C 1 is associated a delay T 1 .
  • the definition of the set of parameters C 1 and T 1 depends upon the implementation, for keeping the required flexibility to use the invention in different fields, under different implementation constraints. Typically, the values T 1 will grow with index i, preferably following an exponential law.
  • the access circuit is directly powered from the same source as the IC executing the conventional logic, typically constituted by the RFID antenna where is received the energy radiated by electromagnetic waves.
  • the access logic is implemented as the first logic triggered once the IC circuit is waken-up. This constitutes the "boot strap" of conventional chips. It follows the logic described on figure 4.
  • the value C of the counter 350 is incremented by one and it is read (step 400) .
  • the value C of the counter 350 is then compared with the thresholds stored within the RFID 300 to determine the threshold C 1 such that C 1 ⁇ C ⁇ C 1+i (step 405) .
  • threshold C 1 has been determined, the RFID 300 is set in an idle state during delay T 1 associated to C 1 (step 410) and the control is given to the conventional logic (step 420) .
  • the conventional logic is typically used to access data stored within the electronic device however, it can also be used to control functions like updating operational parameters, or launching measurement operations, or triggering any embarked process.
  • the RFID has not been accessed since a time greater than T. Accordingly the capacitor is discharged, so that the counter is no longer powered and holds a zero value thanks to the counter reset component.
  • the RFID is powered and thus,
  • the RFID has been recently accessed i.e., the delay between the last access and the current one is less than T. Accordingly the capacitor is still charged, so that the counter holds its last value 1.
  • the RFID has been recently accessed i.e., the delay between the last access and the current one is less than T. Accordingly the capacitor is still charged, so that the counter holds its last value (n-1) .
  • the RFID is powered and thus, - the access logic starts, increments the value of counter C which takes the value n;
  • the induced delay may reach very high values that may even prevent the use of the conventional logic.

Abstract

A system for limiting repeated accesses to an electronic device, particularly to an electronic device receiving power from an external source, is disclosed. According to this system, each consecutive access done to this electronic device in less than a predetermined delay increases a counter that value determines another delay during which electronic device is idle. Preferably, the delay during which electronic device is idle is an exponen- tial function of the counter value. Thanks to this delay, one can not reasonably determine the function of the electronic device by testing a great number of input values, preventing copying this device. According to the invention, the system for limiting repeated accesses to the electronic device comprises, a counter, a counter reset that maintains the value of the counter for a predetermined delay after the power off of the system, and a logic access circuit adapted to increase the value of the counter each time an access is done to the electronic device and to idle the electronic device for a delay depending upon the value of the counter.

Description

METHOD AND SYSTEMS FOR LIMITING REPEATED ACCESSES TO
AN ELECTRONIC DEVICE
Field of the Invention
The present invention relates generally to the methods and systems for controlling the access to data stored within electronic devices and more specifically to a method and systems for limiting repeated attempts to access electronic devices .
Background of the Invention
Conventional method and apparatus exist for making it difficult to counterfeit high value items such as rare wines and perfumes, or documents such as official documents and financial document. A basic concept to assure that the item is genuine requires a form of verification of the item, such as identifiers to confirm the items as being genuine. For example, U.S. Patent Application 2004/0000987 discloses a process for detecting check fraud using Radio Frequency Identifier (RFID) tags. According to this invention, the system comprises a first device for receiving from a payor a request to create a check having a radio frequency identifier (RFID) tag associated therewith. A second device is provided for receiving from a payee a request to validate a check having an RFID tag associated therewith. The system further comprises an RFID repository. A processor is provided for (i) receiving check information from the payor, (ii) updating the RFID repository with check information received from the payor, (iii) receiving scanned check information from the payee, (iv) comparing the scanned check information received from the payee with certain information retrieved from the RFID repository, and (v) determining if the check is valid based upon the comparison of the scanned check information received from the payee with the certain information retrieved from the RFID repository. Preferably, the RFID repository comprises a central RFID repository. Likewise, U.S. Patent 6,226,619 discloses a method and system for preventing counterfeiting of an item, including an answering tag attached to the item. The item includes visible indicia for comparison with secret, non-duplicable information stored in the tag designating authenticity.
According to these methods and systems, it is possible to ensure that a given document has been issued by the relevant person, or that an item has been manufactured by the relevant manufacturer, or that a given official document has been issued by the relevant administration. As mentioned above, these methods and systems are based upon identifiers encoded within the RFIDs however, such identifiers can be duplicated on other RFIDs using a RFID scanner and writer.
Electronic tags such as passive RFID are typical examples of electronic devices which are not equipped with a permanent power source. As mentioned above, such devices may play an important role in many fields, such as security enforcement. Indeed they can record secret information that a hacker may try to crack. One of the easiest and most common strategies followed by hackers is to trigger the RFID tag logic by a sequence of different inputs X1, to collect the sequence of returned information F(X1), hopping that the set of samples (X1, F(X1)) allows to partially or completely "reverse engineer" the function F that hides the secret information . Therefore, there is a need for a method and systems for limiting the risk of reverse engineering the logic imbedded within the chip of an electronic tag such as an RFID.
Summary of the Invention
Thus, it is a broad object of the invention to remedy the shortcomings of the prior art as described here above.
It is another object of the invention to provide an improved electronic device limiting the repeated accesses.
It is a further object of the invention to provide an improved electronic device limiting the repeated accesses, the repeated accesses being non-destructive.
It is a further object of the invention to provide an improved electronic device receiving power from an external source, adapted to limit the repeated accesses.
It is still a further object of the invention to provide a method for limiting repeated accesses to an electronic device.
The accomplishment of these and other related objects is achieved by a system in an electronic device for limiting repeated accesses to said electronic device, said system comprising,
- counting means;
- counter resetting means adapted to maintain the value of said counting means for a predetermined delay after the power off of said system; and, - logic access means adapted to increase the value of said counting means each time an access is done to said electronic device and to idle said electronic device for a delay depending upon the value of said counting means;
and by a method for limiting repeated accesses to an electronic device, said method comprising the steps of,
- resetting a counter when said electronic device is not accessed during a predetermined delay; incrementing said counter each time said electronic device is accessed;
- setting said electronic device in an idle state for a delay depending upon the value of said counter.
Further embodiments of the invention are provided in the appended dependent claims.
Further advantages of the present invention will become apparent to the ones skilled in the art upon examination of the drawings and detailed description. It is intended that any additional advantages be incorporated herein.
Brief Description of the Drawings
Figure 1 depicts an example of the architecture of a passive RFID tag.
Figure 2 comprises figures 2a and 2b. Figure 2a shows an RFID system with a reader having an antenna and an RFID tag having a dipole antenna. Figure 2b illustrates the signal emitted by the antenna of the reader and the modulated signal reflected by the RFID tag.
Figure 3 illustrates an example of a passive RFID according to the invention for limiting the repeated accesses to the data of the tag.
Figure 4 shows an example of the logic associated to the access circuit of the RFID depicted on figure 3.
Detailed Description of the Preferred Embodiment
According to the invention, the time needed to collect a given number of samples (X1, F(X1)) upon which hackers rely to crack a secret information hidden in the function F is extended. The longest the time will be to potentially crack a secret information, the less interest will be found by the hacker as this information may become obsolete or as the required cracking effort may turn as unaffordable .
For sake of illustration, the description is based upon the used of passive RFID but it should be understood that the invention can be implemented with any electronic device for limiting repeated accesses, particularly with any electronic device receiving power from an external source e.g, battery free electronic devices. RFID systems
The core of any RFID system is the 'Tag' or 'Transponder', which can be attached to or embedded within objects, wherein data can be stored. An RFID reader, generi- cally referred to as reader in the following description, sends out a radio frequency signal to the RFID tag that broadcasts back its stored data to the reader. The system works basically as two separate antennas, one on the RFID tag and the other on the reader. The read data can either be transmitted directly to another system like a host computer through standard interfaces, or it can be stored in a portable reader and later uploaded to the computer for data processing. An RFID tag system works effectively in environments with excessive dirt, dust, moisture, and/or poor visibility. It generally overcomes the limitations of other automatic identification approaches.
Several kinds of RFID, such as piezoelectric RFID and electronic RFID, are currently available. For example, passive RFID tags do not require battery for transmission since generally, they are powered by the reader using an induction mechanism (an electromagnetic field is emitted by the reader antenna and received by an antenna localized on the RFID tag) . This power is used by the RFID tag to transmit a signal back to the reader, carrying the data stored in the RFID tag. Active RFID tags comprise a battery to transmit a signal to a reader. A signal is emitted at a predefined interval or transmit only when addressed by a reader.
When a passive High Frequency (HF) RFID tag is to be read, the reader sends out a power pulse e.g., a 134.2KHz power pulse, to the RFID antenna. The magnetic field generated is 'collected' by the antenna in the RFID tag that is tuned to the same frequency. This received energy is rectified and stored on a small capacitor within the RFID tag. When the power pulse has finished, the RFID tag immedi- ately transmits back its data, using the energy stored within its capacitor as its power source. Generally, 128 bits, including error detection information, are transmitted over a period of 20ms. This data is picked up by the receiving antenna and decoded by the reader. Once all the data has been transmitted, the storage capacitor is discharged, resetting the RFID tag to make it ready for the next read cycle. The period between transmission pulses is known as the 'sync time' and lasts between 20ms and 50ms depending on the system setup. The transmission technique used between the RFID tag and the reader is Frequency Shift Keying (FSK) with transmissions generally comprised between 124.2kHz and 134.2kHz. This approach has comparatively good resistance to noise while also being very cost effective to implement. Many applications require that RFID tag attached to objects be read while traveling at specific speeds by a readout antenna .
RFID tags can be read-only, write-once, or read-write. A read-only RFID tag comprises a read-only memory that is loaded during manufacturing process. Its content can not be modified. The write-once RFID tags differ from the readonly RFID tags in that they can be programmed by the end-user, with the required data e.g., part number or serial number. The read-write RFID tags allow for full read-write capability, allowing a user to update information stored in a tag as often as possible in the limit of the memory technology. Generally, the number of write cycles is limited to about 500,000 while the number of read cycles is not limited. A detailed technical analysis of RFID tag is disclosed e.g., in RFID (McGraw-Hill Networking Professional) by Steven Shepard, edition Hardcover.
Figure 1 depicts an example of the architecture of a passive HF or Ultra High Frequency (UHF) RFID tag 100. As shown, the dipole antenna comprising two parts 105-1 and 105-2 is connected to a power generating circuit 110 that provides current from received signal to the logic and memory circuit 115, to the demodulator 120, and to the modulator 125. The input of demodulator 120 is connected to the antenna (105-1 and 105-2) for receiving the signal and for transmitting the received signal to the logic and memory circuit 115, after having demodulated the received signal. The input of modulator 125 is connected to the logic and memory circuit 115 for receiving the signal to be transmitted. The output of modulator 125 is connected to the antenna (105-1 and 105-2) for transmitting the signal after it has been modulated in modulator 125.
The architecture of a semi-passive RFID tag is similar to the one represented on figure 1, the main difference being the presence of a power supply that allows it to function with much lower signal power levels, resulting in greater reading distances. Semi-passive tags do not have an integrated transmitter contrarily to active tags that comprise a battery and an active transmitter allowing them to generate high frequency energy and to apply it to the antenna .
As disclosed in "A basic introduction to RFID technology and its use in the supply chain", White Paper, Laran RFID, when the propagating wave from the reader collides with tag antenna in the form of a dipole, part of the energy is absorbed to power the tag and a small part is reflected back to the reader in a technique known as back-scatter. Theory dictates that for the optimal energy transfer, the length of the dipole must be equal to half the wave length, or λ/2. Generally, the dipole is made up of two λ/4 lengths. Communication from tag to reader is achieved by altering the antenna input impedance in time with the data stream to be transmitted. This results in the power reflected back to the reader being changed in time with the data i.e., it is modulated.
Figure 2, comprising figures 2a and 2b, shows an RFID system 200. As depicted on figure 2a, RFID system 200 comprises a reader 205 having an antenna 210. The antenna 210 emits a signal 215 that is received by an RFID tag 220. Signal 215 is reflected in RFID tag 220 and re-emitted as illustrated with dotted lines referred to as 225. Figure 2b illustrates the signal 215 emitted by the antenna 210 of the reader 205 and the signal 225 reflected by the RFID tag 220. As shown on figure 2b, the reflected signal 225 is modulated.
Logic control limiting repeated accesses
The method and systems of the invention for solving the afore mentioned problem is based on the following principles: the more frequent the RFID is accessed, the longest the user will have to wait before receiving from the RFID the expected information. This principle is based on the use of an innovative logic and innovative access circuit which are exercised before control is given to the conven- tional logic embedded within the RFID for accessing data. Figure 3 illustrates an example of a passive RFID 300 according to the invention for limiting the repeated accesses to the data of the tag. RFID 300 comprises a logic circuit 305, an access circuit 310, and an antenna 315. As illustrated, the logic circuit 300 includes the conventional logic 320 and the new access logic 325. The access circuit 310 includes a diode 330 to enforce capacitor 335 discharge direction, and a leaking resistor 340 with high resistivity. Typically the time T needed to discharge the capacitor would be of several orders of magnitude above the time duration for running the conventional logic. The access circuit 310 further includes a reset counter circuit 345, the role of which is to reset (fill with zeros) the counter 350 when powered off, after the capacitor 335 is discharged. The size of the counter 350 depends upon the implementation. This counter can count within a range from zero to Cmax. Within this range are defined a set of thresholds C1. For each threshold C1 is associated a delay T1. The definition of the set of parameters C1 and T1 depends upon the implementation, for keeping the required flexibility to use the invention in different fields, under different implementation constraints. Typically, the values T1 will grow with index i, preferably following an exponential law.
The access circuit is directly powered from the same source as the IC executing the conventional logic, typically constituted by the RFID antenna where is received the energy radiated by electromagnetic waves.
The access logic is implemented as the first logic triggered once the IC circuit is waken-up. This constitutes the "boot strap" of conventional chips. It follows the logic described on figure 4. When the RFID 300 is powered-on, the value C of the counter 350 is incremented by one and it is read (step 400) . The value C of the counter 350 is then compared with the thresholds stored within the RFID 300 to determine the threshold C1 such that C1 < C < C1+i (step 405) . When threshold C1 has been determined, the RFID 300 is set in an idle state during delay T1 associated to C1 (step 410) and the control is given to the conventional logic (step 420) .
The conventional logic is typically used to access data stored within the electronic device however, it can also be used to control functions like updating operational parameters, or launching measurement operations, or triggering any embarked process.
Examples of using the system limiting repeated accesses
Let illustrate how the invention works in the following examples, where it is assumed that C1 = i + 1 and that T1 = 21"1.
First example (normal scenario)
The RFID has not been accessed since a time greater than T. Accordingly the capacitor is discharged, so that the counter is no longer powered and holds a zero value thanks to the counter reset component.
The RFID is powered and thus,
- the access logic starts, increments the value of counter C which takes the value 1 ; - the threshold C0 = 1 is found; and, - a delay T0 = 0 (associated to C0) is added before giving control to the conventional logic.
In this case, one can understand that for the first access i.e., after a power-off time greater than T, the logic only introduces its own processing delay.
Second example (steps following immediately the ones of the previous example)
The RFID has been recently accessed i.e., the delay between the last access and the current one is less than T. Accordingly the capacitor is still charged, so that the counter holds its last value 1.
Then, the RFID is powered and thus,
- the access logic starts, increments the value of counter C which takes the value 2 ; - the threshold Ci = 2 is found; and,
- a delay I1 = 1 (associated to Ci) is added before giving control to the conventional logic.
Third example (steps following the second example, after n iterations)
The RFID has been recently accessed i.e., the delay between the last access and the current one is less than T. Accordingly the capacitor is still charged, so that the counter holds its last value (n-1) .
Then, the RFID is powered and thus, - the access logic starts, increments the value of counter C which takes the value n;
- the threshold C(n-i) = n is found; and,
- a delay T(n_D = 2""1 - 1 (associated to Cn-i) is added before giving control to the conventional logic.
With values of n becoming large, the induced delay may reach very high values that may even prevent the use of the conventional logic.
Naturally, in order to satisfy local and specific requirements, a person skilled in the art may apply to the solution described above many modifications and alterations all of which, however, are included within the scope of protection of the invention as defined by the following claims .

Claims

Claims :
1. A system in an electronic device for limiting repeated accesses to said electronic device, said system comprising,
- counting means; - counter resetting means adapted to maintain the value of said counting means for a predetermined delay after the power off of said system; and,
- logic access means adapted to increase the value of said counting means each time an access is done to said electronic device and to idle said electronic device for a delay depending upon the value of said counting means.
2. The system of claim 1 wherein said logic access means further comprise selecting means adapted to select a predetermined threshold among a set of predetermined thresholds according to the value of said counting means and to select the predetermined delay associated to said selected predetermined threshold, said system being in an idle state during the delay determined by said selected predetermined delay.
3. The system of either claim 1 or claim 2 wherein said counter resetting means further comprise a capacitor powering said counting means for said predetermined delay after said system is powered-off.
4. The system of claim 3 wherein said counter resetting means further comprise a diode to enforce the discharge direction of said capacitor.
5. The system of any one of the previous claims wherein said electronic device is adapted to receive power from an external source.
6. The system of any one of the previous claims wherein said electronic device is a Radio Frequency IDentifier tag.
7. The system of claim 6 wherein said Radio Frequency IDentifier tag is passive.
8. A method for limiting repeated accesses to an electronic device, said method comprising the steps of, - resetting a counter when said electronic device is not accessed during a predetermined delay; incrementing said counter each time said electronic device is accessed;
- setting said electronic device in an idle state for a delay depending upon the value of said counter.
9. The method of claim 8 further comprising the steps of selecting a predetermined threshold among a set of predetermined thresholds according to the value of said counter and selecting the predetermined delay associated to said selected predetermined threshold, said electronic device being set in an idle state during the delay determined by said selected predetermined delay.
PCT/EP2007/051457 2006-03-23 2007-02-14 Method and systems for limiting repeated accesses to an electronic device WO2007107417A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP07712221A EP1997058A1 (en) 2006-03-23 2007-02-14 Method and systems for limiting repeated accesses to an electronic device
JP2009500797A JP2009530727A (en) 2006-03-23 2007-02-14 Method and system for restricting repeated access to electronic devices

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP06300278 2006-03-23
EP06300278.6 2006-03-23

Publications (1)

Publication Number Publication Date
WO2007107417A1 true WO2007107417A1 (en) 2007-09-27

Family

ID=38198559

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2007/051457 WO2007107417A1 (en) 2006-03-23 2007-02-14 Method and systems for limiting repeated accesses to an electronic device

Country Status (4)

Country Link
EP (1) EP1997058A1 (en)
JP (1) JP2009530727A (en)
CN (1) CN101405745A (en)
WO (1) WO2007107417A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101989860B1 (en) * 2012-12-21 2019-06-17 에스케이하이닉스 주식회사 Memory controller and memory system including the same

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4449040A (en) * 1980-12-06 1984-05-15 Omron Tateisi Electronics Co. Identification code determining apparatus for use in transaction processing apparatus
US5559505A (en) * 1992-05-20 1996-09-24 Lucent Technologies Inc. Security system providing lockout for invalid access attempts
US5594227A (en) * 1995-03-28 1997-01-14 Microsoft Corporation System and method for protecting unauthorized access to data contents
EP0809217A2 (en) * 1996-05-22 1997-11-26 Nec Corporation Secret information indentification system
US20030229597A1 (en) * 2002-06-05 2003-12-11 Sun Microsystems, Inc., A Delaware Corporation Apparatus for private personal identification number management

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3041109A1 (en) * 1980-10-31 1982-06-09 GAO Gesellschaft für Automation und Organisation mbH, 8000 München IDENTIFICATION ELEMENT
JP2002222402A (en) * 2001-01-24 2002-08-09 Dainippon Printing Co Ltd Ic card
JP3929888B2 (en) * 2002-12-25 2007-06-13 株式会社東芝 IC card
JP3929887B2 (en) * 2002-12-25 2007-06-13 株式会社東芝 Semiconductor integrated circuit, semiconductor integrated circuit module, and information device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4449040A (en) * 1980-12-06 1984-05-15 Omron Tateisi Electronics Co. Identification code determining apparatus for use in transaction processing apparatus
US5559505A (en) * 1992-05-20 1996-09-24 Lucent Technologies Inc. Security system providing lockout for invalid access attempts
US5594227A (en) * 1995-03-28 1997-01-14 Microsoft Corporation System and method for protecting unauthorized access to data contents
EP0809217A2 (en) * 1996-05-22 1997-11-26 Nec Corporation Secret information indentification system
US20030229597A1 (en) * 2002-06-05 2003-12-11 Sun Microsystems, Inc., A Delaware Corporation Apparatus for private personal identification number management

Also Published As

Publication number Publication date
CN101405745A (en) 2009-04-08
JP2009530727A (en) 2009-08-27
EP1997058A1 (en) 2008-12-03

Similar Documents

Publication Publication Date Title
EP1960945B1 (en) Method and systems using radio frequency identifier tags for comparing and authenticating items
US7518514B2 (en) Adaptive rule based electronic reminder for personal objects
US7872582B1 (en) RFID tag chips and tags with alternative memory lock bits and methods
US6331145B1 (en) Electronic dice
CN100399350C (en) RFID tag device, tag identification device and radio communication system
CN101416201B (en) Method and systems for localizing objects using passive RFID tags
US20070034686A1 (en) Protection of non-promiscuous data in an rfid transponder
US20080230615A1 (en) Near-field communication card for communication of contact information
US11481592B1 (en) RFID tags with public and private inventory states
US20090201135A1 (en) Wireless ic communication device and response method for the same
US7501932B2 (en) System and method of reading from and/or writing to an RF transponder
US10049317B1 (en) RFID tags with public and private inventory states
US20050134436A1 (en) Multiple RFID anti-collision interrogation method
US20090179743A1 (en) Pseudo-random authentification code altering scheme for a transponder and a base station
Xiao et al. RFID technology, security vulnerabilities, and countermeasures
EP1997058A1 (en) Method and systems for limiting repeated accesses to an electronic device
US20090160610A1 (en) Pseudorandom number generator
RU182178U1 (en) CRYPTOGRAPHIC LABEL
KR101112535B1 (en) Method for Authenticating RFID Readers by Using Flags in RFID Tag
JP2011060136A (en) Portable electronic apparatus, and data management method in the same
US20220084380A1 (en) Methods and apparatuses for determining a position of a security tag
US20090134977A1 (en) Method and apparatus for RFID device coexistance
JPH05225405A (en) Non-contact data storage system
Sethi et al. Challenges of radio frequency identification technique
Leebhaisomboon Enabling transfer-of-ownership capability for passive RFID tags

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07712221

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2007712221

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2009500797

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 200780010047.4

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE