Wireless IC memory, accessing apparatus for use of wireless IC memory, accessing control method for use of wireless IC memory, and wireless IC memory system

ABSTRACT

A wireless IC memory, for improving the security thereof, for achieving protection of business information and privacy, comprises an RFID tag  100 , wherein it is possible to setup “readout disenabling (ReadLock)” condition to the UII code bank for storing ID data of the RFID tag  100 , with a predetermined protocol from an external communication apparatus, within the RFID tag  100 . Setup of “readout disenabling (ReadLock)” condition is stored on a readout enabling/disenabling condition memory portion  105  within the RFID tag  100 . In case where the “readout disenabling (ReadLock)” condition is set up in the UII code bank, a protocol process controller portion  103  of the RFID tag  100 , not responding the UII code, normally, but answers a fake UII code or an error code, or gives no answer, to a request or command of readout of the UII data from the external communication apparatus.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a technology for a wireless IC memory,such as, a RFID (Radio Frequency Identification) tag, representatively,and also an accessing control method for the wireless IC memory.

2. Related Art

As a representative one of the wireless IC memories for enabling datacommunication between an external apparatus through radio waves isalready known the RFID tag. The RFID tag is already developed or spreadinto traceability service for management of distribution history and/ortrace information of articles, mainly in the distribution industry orbusiness. A standard, i.e., ISO 18000-6 Type C, is determined as aspecification of the RFID tag for global use thereof. According to saidstandard, a data memory portion within the RFID tag is defined into four(4) areas, i.e., a user area bank, a tag code bank, a UII code bank anda security bank, wherein a readout request or command for the data ofeach of banks is transmitted to the RFID tag, and said RFID tag answersor responds the data within the corresponding bank.

[Non-Patent Document] ISO/IEC 18000-6:2004 Information technology-Radiofrequency identification for item management-Part 6: Parameters for airinterface communications at 860 MHz to 960 MHz

SUMMARY OF THE INVENTION

However, the data of every bank is so designed that it responds,unconditionally, to the readout command from the external apparatus, ina mechanism thereof; therefore, there is a problem in the securitythereof. For example, in a way of use for the traceability, for example,in particular, on the process of distributing the articles attached withthe RFID tags thereon, the information of the UII code bank, storingtherein a unique ID data of the RFID tag, i.e., the UII (Unique ItemIdentifier) code, can be read out, easily, for everybody, by using anexternal communication apparatus. In this manner, it cannot said thatthe function is sufficient for protection of business information and/orprivacy, etc., only with the fact of following the standard orregulation.

An object, according to the present invention, for dissolving those, isto provide a wireless IC memory improved in security thereof.

According to a one aspect of the present invention, for accomplishingthe object mentioned above, there is provided a wireless IC memory, fortransmitting command or data between an external communicationapparatus, with using radio-wave communication, comprising: an antenna,which is configured to transmit radio-waves carrying a signal with saidexternal communication apparatus; a communication processor portion,which is configured to conduct transmission control of said signal; oneor more of memory bank(s), which is/are configured to memorize datatherein, including an ID bank, which is configured to memorize ID dataof being unique to said wireless IC memory; a protocol processingcontroller portion, which is configured to conduct transmission processof command or data that said signal presents, management of states ofsaid wireless IC memory on protocol, or control of data readout for eachof said memory banks; and a condition memory portion, which isconfigured to set up an enabling/disenabling condition of data readoutof said ID data bank, wherein said protocol processing controllerportion has: a condition setup portion, which is configured to set upone condition, being selected from at least first and second conditions,in said condition memory portion, as the enabling/disenabling conditionof data readout of said ID data bank; and an access control portion,which is configured to respond said ID data, normally, to a readoutcommand of said ID data from said external communication apparatus, whensaid first condition is set up in said condition memory portion, but notrespond said ID data, normally, to the readout command of said ID datafrom said external communication apparatus, when said second conditionis set up in said condition memory portion.

Within this wireless IC memory, according to the present invention, itis possible to set up a specific condition for regulating the readout ofdata, in relation to the ID data bank for storing the ID data unique tothis wireless IC memory, in advance, with an aid of a command protocolpredetermined. In case where such the condition is set up in advance,this wireless IC memory operates, but not responding the ID data,normally, to the readout request or command of the ID data from theexternal communication apparatus.

Within this wireless IC memory, according to the present invention, saidprotocol processing controller portion may have further a statemanagement portion, which is configured to transit the state of saidwireless IC memory on the protocol, among a predetermined number ofstates. And, said access control portion may respond, differently, tothe readout request or command of the ID data from said externalcommunication apparatus, depending on the combination between saidreadout enabling/disenabling condition in relation to said ID data bank,which is set up in said readout enabling/disenabling condition memoryportion, and the state of said wireless IC memory on the protocol. Withthis, it is possible to achieve more complex access control.

According to the preferable embodiment, said condition setup portionsets up one condition, which is selected among first, second and thirdconditions, as said readout enabling/disenabling condition in relationto said ID data bank, and also said state management portion transitsthe state of said wireless IC memory on the protocol, sequentially, inan order of “Replay” state, “Acknowledge” state, “Open” state and“Secured” state, respectively. And, said access control portion respondssaid ID data, normally, to the readout command of said ID data from saidexternal communication apparatus, in case where said first condition isset up in said condition memory portion, irrespective of any one of thestates of said wireless IC memory on the protocol, but though respondingsaid ID data, normally, to the readout command of said ID data from saidexternal communication apparatus, only when the state of said wirelessIC memory on the protocol is the “Secured” state, it does not respond,normally, when it is the state other than said “Secured” state, in casewhere said second condition is set up in said condition memory portion,and further, it does not respond, normally, to the readout command ofsaid ID data from said external communication apparatus, irrespective ofany one of the states of said wireless IC memory on the protocol, incase where said third condition is set up in said condition memoryportion.

Also, according to the present invention, as more detailed embodimentsof the action, i.e., not responding the ID data, normally, to thereadout request or command of ID data from the external communicationapparatus, within this wireless IC memory, various kinds of variationscan be applied therein. One of the those variations is a method ofresponding a fake ID data, normally, which is same in data length tosaid ID data but different in data values thereof. Or, it is alsopossible to responds the fake ID data, normally, which replaces data ofwhole data length of said ID data by “0”. Or, alternately, it ispossible to respond the fake ID data, normally, which replaces data ofwhole data length of said ID data by data of a specific patternpredetermined. Or, it is also possible to the fake ID data, normally,combining data indicative of said second condition or said thirdcondition, and data of a specific pattern predetermined. Responding thefake ID data in this manner, since it seems for the externalcommunication apparatus, that the ID data is answered, normally, fromthe wireless IC memory, responding to the readout request or command ofID data, it is possible for the external communication apparatus toproceed the communication with the wireless IC memory on the protocol inaccordance with the regulation. Therefore, it is possible to enjoy theadvantages or merits of the IC memory, according to the presentinvention, if applying a normal apparatus in accordance with theregulation, as the external communication apparatus.

Also, as other embodiment of not responding the ID data, normally, it isalso possible to respond a predetermined error code or make no response.Or, alternately, not only making such a response as was mentioned above,but it is also possible to respond the fake data of the specificpattern, in relation to a protocol control bit or an error detectionvalue, which is memorized in the ID data bank other than the ID data.

According to a second aspect of the present invention, there is alsoprovided a wireless IC memory, for transmitting command or data betweenan external communication apparatus, with using radio-wavecommunication, comprising: an antenna, which is configured to transmitradio-waves carrying a signal with said external communicationapparatus; a communication processor portion, which is configured toconduct transmission control of said signal; one or more of memorybank(s), which is/are configured to memorize data therein, including anID bank, which is configured to memorize ID data of being unique to saidwireless IC memory; a protocol processing controller portion, which isconfigured to conduct transmission process of command or data that saidsignal presents, management of states of said wireless IC memory onprotocol, or control of data readout for each of said memory banks; anda condition memory portion, which is configured to set up anenabling/disenabling condition of data readout of said ID data bank,wherein said protocol processing controller portion has:

a condition setup portion, which is configured to set up one condition,being selected from at least first and second conditions, in saidcondition memory portion, as the enabling/disenabling condition of datareadout of said ID data bank; and an access control portion, which isconfigured to execute an action requested by said selection command,normally, where said first condition is set up in said condition memoryportion, about the memory banks in relation to said selection condition,but neglects said selection command, or determines inconsistency withsaid selection condition, or not execute the action requested by saidselection command, where said second condition is set up in saidcondition memory portion, about the memory banks in relation to saidselection condition, in case when receiving the selection command havinga selection condition in relation to any of the memory banks, from saidexternal communication apparatus.

With this wireless IC memory, it is possible to set up a specificcondition for regulating the readout of data for each of the memorybanks, with an aid of a predetermined command protocol, in advance. Ifsetting up the specific condition in relation to a certain memory bank,it is possible to bring the wireless IC memory not to operate, normally,responding a selection command, in case when receiving the command ofselecting that wireless command having a specific attribute in relationto that memory bank, and when that specific attribute corresponds tothat.

Further, within the other preferred embodiments, said condition setupportion sets up one condition, which is selected among first, second andthird conditions, as said readout enabling/disenabling condition inrelation to said ID data bank, and said state management portiontransits the state of said wireless IC memory on the protocol,sequentially, in an order of “Replay” state, “Acknowledge” state, “Open”state and “Secured” state, respectively.

And, said access control portion executes the action, normally, which isrequested by said selection, in case where said first condition is setup in said condition memory portion, irrespective of any one of thestates of said wireless IC memory on the protocol, only when the stateof said wireless IC memory on the protocol is the “Secured” state, andthough executing the action, normally, which is requested by saidselection, only when the state of said wireless IC memory on theprotocol is the “Secured” state, but it does not execute the action,normally, which is requested by said selection, when it is the stateother than said “Secured” state, in case where said second condition isset up in said condition memory portion, and further it does not executethe action, normally, which is requested by said selection, irrespectiveof any one of the states of said wireless IC memory on the protocol, incase where said third condition is set up in said condition memoryportion.

According to the present invention, it is possible to provide a wirelessIC memory of being improved in security thereof.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING

Those and other objects, features and advantages of the presentinvention will become more readily apparent from the following detaileddescription when taken in conjunction with the accompanying drawingswherein:

FIG. 1 is a system view of an RFID tag, according to a first embodimentof the present invention;

FIG. 2 is the structural view of a memory portion of the RFID tag,according to the first embodiment of the present invention;

FIG. 3 is an operation flowchart of the RFID tag, according to the firstembodiment of the present invention;

FIG. 4 is a table for showing the states of the RFID tag, and differentoperations corresponding thereto, in combination with condition ofenabling/disenabling readout of a UII code bank;

FIG. 5 is an operation flowchart of the RFID tag, according to the firstembodiment, in particular, when combining “readout disenabling” or“permanent readout disenabling” condition of the UII code bank and“Replay” state of the RFID tag;

FIG. 6 is an operation flowchart of the RFID tag, according to the firstembodiment, in particular, when combining “readout disenabling” or“permanent readout disenabling” condition of the UII code bank and“Acknowledge” state of the RFID tag;

FIG. 7 is an operation flowchart of the RFID tag, according to the firstembodiment, in particular, when combining “readout disenabling” or“permanent readout disenabling” condition of the UII code bank and“Open” state of the RFID tag;

FIG. 8 is an operation flowchart of the RFID tag, according to the firstembodiment, in particular, when combining “permanent readoutdisenabling” condition of the UII code bank and “Secured” state of theRFID tag;

FIG. 9 is an operation flowchart of the RFID tag, according to the firstembodiment, in particular, when combining “readout disenabling”condition of the UII code bank and “Secured” state of the RFID tag;

FIG. 10 is a view for showing example of answers, in particular, whenthe RFID tag, according to the first embodiment, does not respond theUII code, normally;

FIG. 11 is a table for showing states of the RFID tag and differentoperations, corresponding to combinations with enabling/disablingcondition for readout of the memory bank, to which the select conditionrelates, according to a second embodiment; and

FIG. 12 is an operation flowchart of the RFID tag, according to thesecond embodiment.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Hereinafter, embodiments according to the present invention will befully explained by referring to the attached drawings.

The present invention is applicable to various kinds of wireless ICmemories, including an RFID tag, but herein after, explanation will bemade on several embodiments, according to the present invention, as anon-restrictive illustration thereof.

The RFID tag, according to a first embodiment of the present inventionwill be explained, by referring to FIGS. 1, 2, 3, 4, 5, 6, 7, 8, 9 and10.

FIG. 1 is the structural view of the RFID tag, according to the presentembodiment.

The RFID tag 100, enabling to communicate with an external communicationapparatus 106, by using wireless radio wave 107, is constructed with anantenna 101 for conducting transmission of the wireless radio wave 107carrying a signal thereon, an RF communication processor portion 102 forconducting transmission control of the signal mentioned above, aprotocol process controller portion 103 for conducting a process oftransmission of commands and/or data, which are indicated by the signalmentioned above, and/or management of an internal state, a memoryportion 104 having one or more of memory banks for memorizing datatherein, and a readout enabling/disenabling condition memory portion 105for memorizing a readout enabling/disenabling condition of the datastored in the memory bank, for each of the memory banks within thememory portion 104. Herein, as an example of the external communicationapparatus, there may be listed a reader/writer apparatus for use of RFIDtag, etc.

FIG. 2 is the structural view of the memory portion 104 shown in FIG. 1.

The memory portion 104 is constructed with a user area bank 201, for auser to store arbitrary data therein, a tag code bank 202, for a tagproducer to store arbitrary data therein, a UII code bank 203, forstoring data therein, including unique ID data of the FRID tag, i.e.,UII (Unique Item Identifier) code, and a security bank 204, includingpasswords therein, such as, a kill command password or the like,necessary for “kill” setup for brining the RFID tag to be inoperable.

FIG. 3 is a flowchart, in particular, when the reader/writer apparatusreads out the UII code of the RFID tag, according to the presentinvention, and also shows state transition on a protocol of the RFIDtag, at the same time. FIG. 4 is a table for showing a relationshipbetween a plural number of states, in relation to enabling/disenablingof readout of data in the UII code bank 203 within the memory portion104 of the FRID tag according to the present invention, and responsesthereto; i.e., whether the RFID tag should normally respond the UII code(“◯” in the figure) or not (“X” in the figure), responding to thereadout command of the UII code from the external communicationapparatus 106, such as, the reader/writer apparatus, in accordance withthe combination of the states on the protocol of the RFID tag. FIGS. 5-9are flowcharts when the RFID tag, according to the present embodiment,responds the UII code to the command of the external communicationapparatus 106. FIG. 10 shows an example of the answer of the UII codewhen “readout disenabling (ReadLock) condition” is set up for the UIIcode bank 203.

Hereinafter, by referring to those figures, explanation will be made onthe functions and operations of the RFID tag, according to the presentembodiment. Although, not only the reader/writer apparatus 300 for useof RFID tag, but also other equipments than that may be applied, as theexternal communication apparatus 106, however explanation will be madeherein, by referring to an example of the case where the externalcommunication apparatus 106 is the reader/writer apparatus 300 for useof RFID tag, herein.

As is shown in FIG. 4, states on the protocol of the RFID tag 100(herein after, being called “RFID state”, generally) includes “Replay”state, “Acknowledge” state, “Open” state, and “Secured” state. Theprotocol processor portion 103 manages (or memorizes) the present RFIDstate, and also controls the transition thereof.

Also, as the conditions in relation to readout enabling/disenabling ofdata from the plural number of memory banks 201-204 (see FIG. 2) withinthe RFID tag 100 (herein after, being called “readout enabling/disablingcondition”, generally), there are “readout enabling”, “readoutdisenabling (ReadLock)” and “permanent readout disenabling (PermanentReadLock)”. For each of the memory banks, any one of those readoutenabling/disabling conditions can be set up in the RFID tag 100 througha predetermined command sequence. Thus, when the setup is made on thereadout enabling/disabling condition through the predetermined commandsequence, setup data (for example, flag information) of the readoutenabling/disabling condition is stored into the readoutenabling/disabling condition memory portion 105, under the control ofthe protocol process controller portion 103.

Hereinafter, the more details thereof will be given.

First of all, explanation will be made on a flow, in particular, whenthe “readout enabling” conditions are set up for every memory banks ofthe RFID tag 100, and when the RFID tag 100 responds the UII code,normally, and further responds, normally, to the data readout command ofthe user area bank 201, etc., responding to the command from thereader/writer 300, by referring to FIGS. 1, 2 and 3.

By referring to FIG. 3, firstly, upon receipt of radio wave 107 from thereader/writer 300 on the antenna 101, the RFID tag 100 stars up, and theprotocol process controller portion 103 operates to transit into “Ready”state through the RF communication processor portion 102 (step S301).Next, for the purpose of selecting a RFID tag having a specificattribute, the reader/writer 300 transmits a Select command to the RFIDtag 100, including a Select condition, which designates that specificattribute (step S302). Upon receipt of the Select command through theantenna 101 and the RF communication processor portion 102, the protocolprocess controller portion 103 confirms the “readout enabling” conditionis set up also for every one of the memory banks 201-204 by referring tothe readout enabling/disabling condition memory portion 105, and thenexecutes an action designated in case when the attribute of the RFID tag100 agree or be coincident with the Select condition (step S303). TheSelect condition, in more details thereof, for example, is such that,for example, “a RFID tag, which are coincident with “0xFFFF” in thelower 4 digits of the UII code of” or the like, and the actiondesignated is such that, for example, “set up the state of any one ofthe flags, which the FRID tag has, into the state, ‘1’” or the like.

Next, the reader/writer 300 transmits a Query command to the RFID tag(step S304). In the Query command are included a number of information,being equal to the number of slots (i.e., a slot number) necessary forcongestion control of RFID tags, and then the protocol processcontroller portion 103 receiving the Query command through the RFcommunication processor portion 102 sets up arbitrary numeric value,being equal or less than that slot number, to be a slot counter value.And then, the reader/writer 300 transmits a QueryRep command to the RFIDtag 100, sequentially, while decrementing that slot number. The protocolprocess controller portion 103 of the RFID tag 100 responds NR16 to theQueryRep command of the slot counter value or the Query command,corresponding thereto (step S305), and transits into the “Reply” state(step S306).

Next, when receiving the NR16 mentioned above, the reader/writer 300transmits Ack command (step S307). On the contrary to this, the protocolprocess controller portion 103 responds the UII code when confirmingthat every memory banks 201-204 are in the condition of “readoutenabling” by referring to the readout enabling/disabling conditionmemory portion 105 (step S308), and transits into the “Acknowledge”state (step S309). Up to the steps mentioned above, the flow ofresponding the UII code is ended.

In case when further necessity an accessing process, such as, readingout data in the user area bank 201 or writing data, for example, thenthe reader/writer 300 transmits a Req_RN command, following to the above(step S310). The RFID tag 100 responds a handle (step S311), andtransits into the “Open” state (step S312). The RFID tag 100 conducts apredetermined operation, responding to a Read command or a Writecommand, when it is in the “Open” state.

Next, when trying to transit the RFID tag 100 into the “Secured” state,the reader/writer 300 transmits an Access command (step S313). ThatAccess command includes a Password and a handle therein, and theprotocol process controller portion 103 of the RFID tag 100 responds thehandle, again, in case when the said handle is coincident with thepassword, which is stored in the security bank 204, and also when thathandle is coincident with the handle, which is responded in the stepS311 (step S312), and transits into the “Secured” state. The RFID tagunder the “Secured” state is able to conduct operations, such as,transiting into the state of not operating even upon receipt of a killcommand, including a correct password (i.e., a killed state), etc.

FIG. 4 shows relationships, i.e., the RFID tag 100 should answer the UIIcode, normally or not, responding to the Ack command from thereader/writer apparatus 300, depending on the combination between thereadout enabling/disenabling condition in relation to the UII code bank203; i.e., the “readout enabling” condition 401, the “readoutdisenabling (ReadLock)” condition 402 or the “permanent readoutdisenabling (Permanent Readlock)” condition 403, and the RFID statetransmittable, i.e., the “Reply” state 404, the “Acknowledge” state 405,the “Open” state 406 or the “Secured” state 407. The case of normallyresponding is indicated by “◯” in the figure, and the case of notnormally responding by “X” in the figure.

When the “readout enabling” condition 401 is set up in relation to theUII code bank 203, then the RFID tag 100 can reads out the UII code,normally, even when it is in anyone of the states. When the “readoutdisenabling (ReadLock)” condition 402 is set up in relation to the UIIcode bank 203, although the RFID tag 100 can read out the UII code,normally, only when it is in the “secured” state, but it cannot readoutthe UII code, normally, under the states other than that. Also, when the“permanent readout disenabling (Permanent Readlock)” condition 403 isset up in relation to the UII code bank 203, the RFID tag 100 can readout the UII code, normally, in any state (even in the “secured” state).

An operation of responding the UII code, normally, upon receipt of theAck command, in case when combining the “readout enabling” condition 401and the “Reply” state 404, corresponds to that of the step S308 shown inabove-mentioned FIG. 3. The combination between the “readout enabling”condition 401 and the “Acknowledge” state 405 corresponds to the stepS309 in FIG. 3, but in this state, the tag responds the UII code,normally, in case when receiving the Ack command. The combinationbetween the “readout enabling” condition 401 and the “Open” state 406corresponds to the step S312 in FIG. 3, and also the combination betweenthe “readout enabling” condition 401 and the “Secured” state 407 to thestep S315 in FIG. 3, but in any case, the tag responds the UII code,normally, in case when receiving the Ack command under that state.

FIG. 5 is a flowchart for showing the operation when combining the“readout disenabling (ReadLock)” condition 402 or the “permanent readoutdisenabling (Permanent Readlock)” condition 403, in relation to the UIIcode bank 203 shown in FIG. 4, and the “Replay” state 404. The processesreaching to the “Replay” state (see, the step S306) in FIG. 5 aresimilar to those before reaching to the step S306 in FIG. 3.

In case of receiving the Ack command from the reader/writer apparatus300 under such combination (step S307), when confirming that the“readout disenabling (ReadLock)” condition 402 or the “permanent readoutdisenabling (Permanent Readlock)” condition 403 is set up to the UIIcode bank 203 by referring to the readout enabling/disabling conditionmemory portion 105, then the protocol process controller portion 103,not responding the UII code, normally (step S501), but it transits thetag into the “Acknowledge” state (step S309). More detailed example ofthe operation, i.e., not responding the UII code, normally, will bementioned later, by referring to FIG. 10.

FIG. 6 is a flowchart for showing the operation when combining the“readout disenabling (ReadLock)” condition 402 or the “permanent readoutdisenabling (Permanent Readlock)” condition 403, in relation to the UIIcode bank 203 shown in FIG. 4, and the “Acknowledge” state 405. Theprocesses reaching to the “Acknowledge” state (see, the step S309) inFIG. 6 are similar to those before reaching to the step S309 in FIG. 3.

In case of receiving the Ack command from the reader/writer apparatus300 under such combination (step S601), when confirming that the“readout disenabling (ReadLock)” condition 402 or the “permanent readoutdisenabling (Permanent Readlock)” condition 403 is set up to the UIIcode bank 203 by referring to the readout enabling/disabling conditionmemory portion 105, then the protocol process controller portion 103,not responding the UII code, normally (step S602), but it maintains the“Acknowledge” state (step S603). More detailed example of the operation,i.e., not responding the UII code, normally, will be mentioned later, byreferring to FIG. 10.

FIG. 7 is a flowchart for showing the operation when combining the“readout disenabling (ReadLock)” condition 402 or the “permanent readoutdisenabling (Permanent Readlock)” condition 403, in relation to the UIIcode bank 203 shown in FIG. 4, and the “Open” state 406. The processesreaching to the “Open” state (see, the step S312) in FIG. 7 are similarto those before reaching to the step S312 in FIG. 3.

In case of receiving the Ack command from the reader/writer apparatus300 under such combination (step S701), when confirming that the“readout disenabling (ReadLock)” condition 402 or the “permanent readoutdisenabling (Permanent Readlock)” condition 403 is set up to the UIIcode bank 203 by referring to the readout enabling/disabling conditionmemory portion 105, then the protocol process controller portion 103,not responding the UII code, normally (step S702), but it maintains the“Open” state (step S703). More detailed example of the operation, i.e.,not responding the UII code, normally, will be mentioned later, byreferring to FIG. 10.

FIG. 8 is a flowchart for showing the operation when combining the“permanent readout disenabling (Permanent Readlock)” condition 403 inrelation to the UII code bank 203 shown in FIG. 4, and the “Secured”state 406. The processes reaching to the “Secured” state (see, the stepS800) in FIG. 8 are similar to those before reaching to the step S315 inFIG. 3.

In case of receiving the Ack command from the reader/writer apparatus300 under such combination (step S801), when confirming that the“permanent readout disenabling (Permanent Readlock)” condition 403 isset up to the UII code bank 203 by referring to the readoutenabling/disabling condition memory portion 105, then the protocolprocess controller portion 103, not responding the UII code, normally(step S802), but it maintains the “Secured” state (step S803). Moredetailed example of the operation, i.e., not responding the UII code,normally, will be mentioned later, by referring to FIG. 10.

FIG. 9 is a flowchart for showing the operation when combining the“readout disenabling (Readlock)” condition 402 in relation to the UIIcode bank 203 shown in FIG. 4, and the “Secured” state 406. Theprocesses reaching to the “Secured” state (see, the step S900) in FIG. 9are similar to those before reaching to the step S315 in FIG. 3.

In case of receiving the Ack command from the reader/writer apparatus300 under such combination (step S901), when confirming that the“readout disenabling (Permanent Readlock)” condition 402 is set up tothe UII code bank 203 by referring to the readout enabling/disablingcondition memory portion 105, then the protocol process controllerportion 103 responds the UII code, normally (step S902), and maintainsthe “Secured” state (step S903).

In FIG. 10 will be shown the more detailed example of the operation,i.e., not responding the UII code, normally.

As is show by A in FIG. 10, the UII code bank 203 is constructed with PCbit 110, UII code 111, and CRC-16 data 112. The PC bit 110 means theProtocol-control (PC) bit, and it is regulated to include theinformation of length of the PC bit, etc. Also, the UII code 111 storestherein ID data unique to the FRID tag, and the longest length ofstorable codes therein depends on the specification of the FRID tag. Forthat reason, it is so determined that effective UII code length isdefined within the PC bit 110. The CRC-16 data 112 is calculated in theprotocol process controller portion 103, to be an error detection value,including the effective UII code, and that value is stored therein.

As is show by B in FIG. 10, in case when the “readout enabling”condition 113 is set up in the UII code bank 203, the protocol processcontroller portion 103 answers the normal data of the PC bit 110, theUII code 111 and the CRC-16 data 112, responding to the request orcommand from the reader/writer apparatus 300, as explained in the stepS308 shown in FIG. 3.

On the other hand, when the “readout disenabling (ReadLock)” conditionis set up in the UII code bank 203, the methods for responding the UIIcode can be made as below, for example.

As is show by C in FIG. 10, in the case when the “readout disenabling(ReadLock)” condition 114 is set up in the UII code bank 203, theprotocol process controller portion 103 responds the normal values inrelation to the PC bit 110 and the CRC-16 data 112, and it responds afake UII code in relation to the UII code 111, by changing all data ofthe effective UII code length, which is designated in the PC bit, into“0x0”.

Or alternately, as a variation thereof, as shown by D in FIG. 10, incase when the “readout disenabling (ReadLock)” condition 115 is set upin the UII code bank 203, the protocol process controller portion 103may respond the normal values in relation to the PC bit 110 and theCRC-16 data 112, and it responds a fake UII code in relation to the UIIcode 111, by changing all data of the effective UII code length, whichis designated in the PC bit, into “0xF”.

Or in other variation thereof, as shown by E in FIG. 10, in case whenthe “readout disenabling (ReadLock)” condition 116 is set up in the UIIcode bank 203, the protocol process controller portion 103 may respondthe normal values in relation to the PC bit 110 and the CRC-16 data 112,and it responds a fake UII code in relation to the UII code 111, bychanging all data of the effective UII code length, which is designatedin the PC bit, into a specific data pattern, such as, “0xF0F0 . . . ”,for example.

Or, in further other variation thereof, as shown by F in FIG. 10, incase when the “readout disenabling (ReadLock)” condition 117 is set upin the UII code bank 203, the protocol process controller portion 103may respond the normal values in relation to the PC bit 110 and theCRC-16 data 112, and it responds a fake UII code in relation to the UIIcode 111, by replacing data of the effective UII code length, which isdesignated in the PC bit, with the data combining the setup data (flag)of the “readout disenabling (ReadLock)” condition, being the data lengthbelow that, and data by changing all data corresponding to the remainingdata length by a specific data pattern of “0x0”, etc.

Or, in further other variation thereof, as shown by G in FIG. 10, incase when the “readout disenabling (ReadLock)” condition 118 is set upin the UII code bank 203, the protocol process controller portion 103may respond a fake UII code, by changing data of either the PC bit 110and the CRC-16 data 112, or the UII code 111, into the specific datapattern of “0x0”, for example, corresponding to the data length thereof,respectively.

Or, alternately, as further other variation of the operation of notresponding the UII code, normally, it is also possible to adapt anoperation of responding a predetermined error code, but not shown in thefigure, or no response, etc.

The operation mentioned above, i.e., not responding the UII code,normally, it can be applied, not only in the case when the “readoutdisenabling (ReadLock)” condition is set up, but also when the “readoutdisenabling (Permanent Readlock)” condition is set up.

In the case when applying the operation of responding the fake UII codeof the data length same to that of the correct UII data, as shown by A-Gin FIG. 10, as the operation of not responding the UII code, normally,since it seems for the reader/writer apparatus 300 that the UII code isresponded, normally, in the step S308 shown in FIG. 3, therefore it ispossible to bring the RFID tag 100 into the “Secured” state, for thereader/writer apparatus 300, by executing the protocols in accordancewith the standard or regulation shown in FIG. 3. Therefore, even in thecase of applying the conventional apparatus in accordance with thestandard or regulation, as the reader/writer apparatus 300, it ispossible, for the RFID tag 100, to achieve such advantages of being highin the security thereof.

As was explained in the above, the RFID tag according to the presentembodiment, by setting up the “readout disenabling (ReadLock)” conditionin the UII bank, it will not respond the UII code, normally, other thanthe “Secured” state, or by setting up the “permanent readout disenabling(Permanent ReadLock)” condition in the UII bank, it never respond theUII code, normally. For this reason, only for a user who knows thepassword of the RFID tag and therefore can bring the RFID tag into the“Secured” state, it is possible to read out the UII code, and thereforean improvement can be achieved in the property of security thereof.

Next, explanation will be made on the FRID tag, according to a secondembodiment of the present invention, by referring to FIGS. 11 and 12attached herewith.

FIG. 11 is a table for showing a relationship between the readoutenabling/disenabling conditions to the memory banks building up thememory portion 104 of the RFID tag 100, according to the presentembodiment, and responses thereto; i.e., whether the RFID tag shouldnormally respond the UII code (“◯” in the figure) or not (“X” in thefigure), responding to the Select command from the externalcommunication apparatus 106, such as, the reader/writer apparatus, etc.,depending on the combination with the transmittable state of the RFIDtag (i.e., the RFID state). In FIG. 11, it is presumed that the Selectcommand designates the Select condition in relation to the memory bankswhere the readout enabling/disenabling conditions thereof are alreadyset up. FIG. 12 is a flowchart for showing the operations of the RFIDtag 100, in case when the RFID tag 100 receives the Select command fromthe reader/writer apparatus 300.

As is shown in FIG. 11, in case where the “readout enabling” condition401 is set up in the memory bank, to which the Select condition of theSelect command relates (i.e., the memory bank, the attribute of which isdesignated, in relation to the memory bank), when the FRID tag 100receives the Select command, the protocol process controller portion 103confirms that the “readout enabling” condition is set up in the memorybank thereof by referring to the readout enabling/disabling conditionmemory portion 105, and thereby conducting the normal operationresponding to the Selection command, where the RFID tag 100 is in anystate thereof; i.e., “Ready” state 119, “Attribute” state 120, “Replay”state 121, “Acknowledged” state 122, “Open” state 123, or “Secured”state 124.

Also, in case where the “readout disenabling (ReadLock)” condition 402is set up in the memory bank, to which the Select condition of theSelect command relates, and the RFID tag state is in the “Secured” state124, the protocol process controller portion 103 conducts the normaloperation responding to the Selection command, in the similar mannerthereof. The detailed flows thereof are similar to those, which areexplained about the steps S302 and S303 in FIG. 3.

On the other hand, as is shown in FIG. 11, in case where the “readoutdisenabling (ReadLock)” condition 402 or the “permanent readoutdisenabling (Permanent ReadLock)” condition 403 is set up in the memorybank, to which the Select condition of the Select command relates, andthe RFID tag 100 is in any one of the states, i.e., the “Ready” state119, the “Attribute” state 120, the “Replay” state 121, “Acknowledged”state 122, and “Open” state 123, then the protocol process controllerportion 103 does not conduct the normal operation responding to theSelection command, when the FRID tag 100 receives the Select command.Also, in case where the “permanent readout disenabling (PermanentReadLock)” condition 403 is set up in the memory bank, to which theSelect condition of the Select command relates, even the RFID tag is inthe “Secured” state 124, the protocol process controller portion 103does not operate, normally, responding to the Select command.

In more details thereof, as is shown in FIG. 12, when the RFID tag 100is in any one of the states mentioned above (step S125), the Selectcommand is transmitted from the reader/writer apparatus 300 (step S125).Then, the protocol process controller portion 103 checks the readoutenabling/disenabling condition set up in the memory bank, to which theSelect condition of the Select command relates, by referring to thereadout enabling/disabling condition memory portion 105. As a resultthereof, if it is confirmed that the “readout disenabling (ReadLock)”condition or the “permanent readout disenabling (Permanent ReadLock)”condition is set up, then the protocol process controller portion 103does not operate, normally, by a way of doing; i.e., neglecting theSelect command, or determining “inconsistency” to the Selectioncondition of the Selection command, or not executing the actionrequested by the Select command, for example.

As was fully mentioned in the above, the RFID tag according to thepresent embodiment, does not operate, normally, responding to the Selectcommand, in the case where the “readout disenabling (ReadLock)”condition or the “permanent readout disenabling (Permanent ReadLock)”condition is set up in the memory bank, to which the Select condition ofthe Select command relates; therefore, there is no chance that the datain the memory banks is read out, unconditionally, but only the user whoknows the password can read out the data thereof, and thereby improvingthe property of security thereof.

While we have shown and described several embodiments in accordance withour invention, it should be understood that disclosed embodiments aresusceptible of changes and modifications without departing from thescope of the invention. Therefore, we do not intend to be bound by thedetails shown and described herein but intend to cover all such changesand modifications that fall within the ambit of the appended claims. Forexample, the present invention may be applied into wireless IC memoriesother than the RFID tag.

1. A wireless IC memory, for transmitting command or data between anexternal communication apparatus, with using radio-wave communication,comprising: an antenna, which is configured to transmit radio-wavescarrying a signal with said external communication apparatus; acommunication processor portion, which is configured to conducttransmission control of said signal; one or more memory banks, which areconfigured to memorize data therein, including an ID bank, a user areabank, a tag-code bank and a security bank, and which are configured tomemorize UII code, which is ID data of being unique to said wireless ICmemory; a protocol processing controller portion, which is configured toconduct transmission process of command or data that said signalpresents, management of states of said wireless IC memory on protocol,or control of data readout for each of said memory banks; and acondition memory portion, including, at least, said ID data bank, whichis configured to set up an enabling/disenabling condition of datareadout of said ID data bank for each memory bank, wherein said protocolprocessing controller portion has: a condition setup portion, which isconfigured to set up one condition, being selected from at least firstand second conditions, in said condition memory portion, as theenabling/disenabling condition of data readout of said ID data bank; andan access control portion, which is configured to respond said ID data,normally, to a readout command of said ID data from said externalcommunication apparatus, when said first condition is set up in saidcondition memory portion, but not respond said ID data, normally, to thereadout command of said ID data from said external communicationapparatus, when said second condition is set up in said condition memoryportion.
 2. A wireless IC memory, for transmitting command or databetween an external communication apparatus, with using radio-wavecommunication, comprising: an antenna, which is configured to transmitradio-waves carrying a signal with said external communicationapparatus; a communication processor portion, which is configured toconduct transmission control of said signal; one or more memory banks,which are configured to memorize data therein, including an ID bank, auser area bank, a tag-code bank and a security bank, and which areconfigured to memorize UII code, which is ID data unique to saidwireless IC memory; a protocol processing controller portion, which isconfigured to conduct transmission process of command or data that saidsignal presents, management of states of said wireless IC memory onprotocol, or control of data readout for each of said memory banks; anda condition memory portion, including, at least, said ID data bank,which is configured to set up an enabling/disenabling condition of datareadout of said ID data bank for each memory bank, wherein said protocolprocessing controller portion has: a condition setup portion, which isconfigured to set up one condition, being selected from at least firstand second conditions, in said condition memory portion, as the readoutenabling/disenabling condition of data of said ID data bank; an accesscontrol portion, which is configured to respond said ID data, normally,to a readout command of said ID data from said external communicationapparatus, when said first condition is set up in said condition memoryportion, but not respond said ID data, normally, to the readout commandof said ID data from said external communication apparatus, when saidsecond condition is set up in said condition memory portion; and a statemanagement portion, which is configured to transit the state of saidwireless IC memory on the protocol, among a predetermined number ofstates, wherein said access control portion conducts a response,differently, to the readout command of said ID data from said externalcommunication apparatus, depending upon combination between the readoutenabling/disenabling condition in relation to said ID data bank, whichis set up in said readout condition setup portion, and the state of saidwireless IC memory on the protocol.
 3. A wireless IC memory, fortransmitting command or data between an external communicationapparatus, with using radio-wave communication, comprising: an antenna,which is configured to transmit radio-waves carrying a signal with saidexternal communication apparatus; a communication processor portion,which is configured to conduct transmission control of said signal; oneor more memory banks, which are configured to memorize data therein,including an ID bank, a user area bank, a tag-code bank and a securitybank, and which are configured to memorize UII code, which is ID dataunique to said wireless IC memory; a protocol processing controllerportion, which is configured to conduct transmission process of commandor data that said signal presents, management of states of said wirelessIC memory on protocol, or control of data readout for each of saidmemory banks; and a condition memory portion, including, at least, saidID data bank, which is configured to set up an enabling/disenablingcondition of data readout of said ID data bank for each memory bank,wherein said protocol processing controller portion has: a conditionsetup portion, which is configured to set up one condition, beingselected from at least first and second conditions, in said conditionmemory portion, as the readout enabling/disenabling condition of data ofsaid ID data bank; an access control portion, which is configured toconduct a response, differently, to the readout command of said ID datafrom said external communication apparatus, depending upon combinationbetween the readout enabling/disenabling condition in relation to saidID data bank, which is set up in said readout condition setup portion,and the state of said wireless IC memory on the protocol; and a statemanagement portion, which is configured to transit the state of saidwireless IC memory on the protocol, among a predetermined number ofstates, wherein said condition setup portion sets up one condition,which is selected among first, second and third conditions, as saidreadout enabling/disenabling condition in relation to said ID data bank,said state management portion transits the state of said wireless ICmemory on the protocol, sequentially, in an order of “Replay” state,“Acknowledge” state, “Open” state and “Secured” state, respectively, andsaid access control portion responds said ID data, normally, to thereadout command of said ID data from said external communicationapparatus, in case where said first condition is set up in saidcondition memory portion, irrespective of any one of the states of saidwireless IC memory on the protocol, said access control portion, thoughresponding said ID data, normally, to the readout command of said IDdata from said external communication apparatus, only when the state ofsaid wireless IC memory on the protocol is the “Secured” state, but doesnot respond, normally, when it is the state other than said “Secured”state, in case where said second condition is set up in said conditionmemory portion, and further, said access control portion does notrespond, normally, to the readout command of said ID data from saidexternal communication apparatus, irrespective of any one of the statesof said wireless IC memory on the protocol, in case where said thirdcondition is set up in said condition memory portion.
 4. The wireless ICmemory, as is described in the claim 3, wherein said access controlportion responds a fake ID data, normally, which is same in data lengthto said ID data but different in data values thereof, as an action ofnot responding said ID data.
 5. The wireless IC memory, as is describedin the claim 4, wherein said access control portion responds said fakeID data, normally, which replaces data of whole data length of said IDdata by “0”, as the action of not responding said ID data.
 6. Thewireless IC memory, as is described in the claim 4, wherein said accesscontrol portion responds said fake ID data, normally, which replacesdata of whole data length of said ID data by data of a specific patternpredetermined, as the action of not responding said ID data.
 7. Thewireless IC memory, as is described in the claim 4, wherein said accesscontrol portion responds said fake ID data, normally, combining dataindicative of said second condition or said third condition, and data ofa specific pattern predetermined, as the action of not responding saidID data.
 8. The wireless IC memory, as is described in the claim 4,wherein: said ID data bank also stores a protocol control bit and anerror detection value, together with said ID data, therein, and saidaccess control portion responds a fake protocol control bit and a fakeerror detection value, as well as, said fake ID data, as the action ofnot responding said ID data, normally.
 9. The wireless IC memory, as isdescribed in the claim 3, wherein said access control portion responds apredetermined error code or makes no response, as an action of notresponding said ID data, normally.
 10. A wireless IC memory, fortransmitting command or data between an external communicationapparatus, with using radio-wave communication, comprising: an antenna,which is configured to transmit radio-waves carrying a signal with saidexternal communication apparatus; a communication processor portion,which is configured to conduct transmission control of said signal; oneor more memory banks, which are configured to memorize data therein,including an ID bank, a user area bank, a tag-code bank and a securitybank, and which are configured to memorize a UII code, which is ID dataunique to said wireless IC memory; a protocol processing controllerportion, which is configured to conduct transmission process of commandor data that said signal presents, management of states of said wirelessIC memory on protocol, or control of data readout for each of saidmemory banks; and a condition memory portion, including, at least, saidID data bank, which is configured to set up an enabling/disenablingcondition of data readout of said ID data bank for each memory bank,wherein said protocol processing controller portion has: a conditionsetup portion, which is configured to set up one condition, beingselected from at least first and second conditions, in said conditionmemory portion, as the enabling/disenabling condition of data readout ofsaid ID data bank; and an access control portion, which is configured toexecute an action requested by said selection command, normally, wheresaid first condition is set up in said condition memory portion, aboutthe memory banks in relation to said selection condition, but neglectssaid selection command, or determines inconsistency with said selectioncondition, or not execute the action requested by said selectioncommand, where said second condition is set up in said condition memoryportion, about the memory banks in relation to said selection condition,in case when receiving the selection command having a selectioncondition in relation to any of the memory banks, from said externalcommunication apparatus.
 11. The wireless IC memory, as is described inthe claim 10, wherein: said condition setup portion sets up onecondition, which is selected among first, second and third conditions,as said readout enabling/disenabling condition in relation to said IDdata bank, said state management portion transits the state of saidwireless IC memory on the protocol, sequentially, in an order of“Replay” state, “Acknowledge” state, “Open” state and “Secured” state,respectively, and said access control portion executes the action,normally, which is requested by said selection, in case where said firstcondition is set up in said condition memory portion, irrespective ofany one of the states of said wireless IC memory on the protocol, onlywhen the state of said wireless IC memory on the protocol is the“Secured” state, said access control portion, though executing theaction, normally, which is requested by said selection, only when thestate of said wireless IC memory on the protocol is the “Secured” state,but does not execute the action, normally, which is requested by saidselection, when it is the state other than said “Secured” state, in casewhere said second condition is setup in said condition memory portion,and further, said access control portion does not execute the action,normally, which is requested by said selection, irrespective of any oneof the states of said wireless IC memory on the protocol, in case wheresaid third condition is set up in said condition memory portion.
 12. Awireless IC memory accessing apparatus, which is configured to controlthe wireless IC memory as described in the claim
 1. 13. A wireless ICmemory accessing apparatus, which is configured to control the wirelessIC memory as described in the claim
 2. 14. A wireless IC memoryaccessing apparatus, which is configured to control such wireless ICmemory as described in the claim
 3. 15. An accessing control method foruse of the wireless IC memory, which is configured to control suchwireless IC memory as described in the claim
 1. 16. An accessing controlmethod for use of the wireless IC memory, which is configured to controlsuch wireless IC memory as described in the claim
 2. 17. An accessingcontrol method for use of the wireless IC memory, which is configured tocontrol such wireless IC memory as described in the claim
 3. 18. Awireless IC memory system including such wireless IC memory as describedin the claim 1, and a wireless IC memory accessing apparatus, which isconfigured to control said wireless IC memory.
 19. A wireless IC memorysystem including such wireless IC memory as described in the claim 2,and a wireless IC memory accessing apparatus, which is configured tocontrol said wireless IC memory.
 20. A wireless IC memory systemincluding such wireless IC memory as described in the claim 3, and awireless IC memory accessing apparatus, which is configured to controlsaid wireless IC memory.