RFID tag
A technology of RFID tags and tags, applied in the field of RFID tags, can solve the problems of reducing the convenience of using RFID and not being able to access data from a long distance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0043] Fig. 1 shows a schematic configuration of an RFID tag according to a first embodiment of the present invention. As shown in FIG. 1 , an RFID tag 101 according to the first embodiment includes: a first antenna unit 1 for transmitting / receiving radio waves to / from an RFID reader / writer 200; radio wave; the first energy supply unit 2 is used to extract energy from the radio wave received by the first antenna unit 1; the data receiving unit 3 is used to carry out the command contained in the radio wave received by the first antenna unit 1 decode, and send the generated data to the control unit 5; the data sending unit 4 is used to encode the return data sent by the control unit 5 with the transmitted radio wave from the first antenna unit 1; the control unit 5 is used to Interprets commands contained in radio waves received by the first antenna unit 1 and accesses the storage unit 6 for storing ID, user data, etc.; and the external energy input unit 12 for inputting externa...
no. 2 example
[0060] The RFID tag 101 shown in FIG. 1 is configured such that the first antenna unit 1 and the second antenna unit 7 use the same communication frequency band. However, the frequency band of the first antenna unit 1 may be different from that of the second antenna unit 7 , and the RFID tag 101 may include another radio wave source for the second antenna unit 7 .
[0061] For example, as shown in FIG. 6 , the frequency band of the first antenna unit 1 is made different from that of the second antenna unit 7 , and a radio wave source 300 is provided for the second antenna unit 7 independently of the RFID reader / writer 200 .
[0062] According to the RFID tag 101', the second antenna unit 7 receives radio waves from the radio wave source 300 when the radio wave source 300 is located within the communicable distance L2 of the second antenna unit 7. Since the energy of the received radio waves is sufficiently high for the reception sensitivity of the second antenna unit 7, the se...
no. 3 example
[0065] In the first embodiment, all data stored in the storage unit 6 are protected from malicious access. However, it is conceivable that, depending on the type of data, some data does not require protection. Therefore, the third embodiment switches the storage unit for storage based on the data type, and sets only the data that needs to be protected as the target to avoid unauthorized access, thereby further improving the convenience of using data.
[0066] Fig. 8 shows a schematic configuration of an RFID tag according to a third embodiment of the present invention. The RFID tag 102 of the third embodiment has a configuration in which the storage unit 6 is divided into a protected storage unit 6A and an unprotected storage unit 6B. The protected storage unit 6A stores data that needs to be protected. The unprotected storage unit 6B stores data that does not require protection. The control unit 5 comprises two functional units, namely: an access prohibition unit 5C, which...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
