Printing device reading information from and writing information to storage element provided on tape

ABSTRACT

In a printing device, a supply portion is configured to convey a tape in its longitudinal direction. The tape includes: a plurality of labels arranged continuously in the longitudinal direction; and a plurality of storage elements provided on respective ones of the plurality of labels. A first storage element is provided on a first label and configured to store first authentication data. The second storage element is provided on a second label and configured to store second authentication data. A printing portion is configured to print on the plurality of labels. A controller is configured to perform: reading the first authentication data from the first storage element and the second authentication data from the second storage element by a reading portion; and determining whether the first authentication data is correlated to the second authentication data to meet an authentication condition.

CROSS REFERENCE TO RELATED APPLICATION

This application claims priority from Japanese Patent Application No.2019-048317 filed Mar. 15, 2019. The entire content of the priorityapplication is incorporated herein by reference.

TECHNICAL FIELD

The present disclosure relates to a printing device and a tape.

BACKGROUND

There are known in the art a tape provided with storage elements capableof storing information, and a printing device capable of readinginformation from and writing information to the storage elementsprovided on the tape through contactless communication. Japanese PatentApplication Publication No. 2007-296746 provides an example of a radiofrequency identification (RFID) inlet mounted on an RFID label paper. AnRFID label printing device possessing printing means determines whetherinformation read from the RFID inlet through contactless communicationincludes a type code for a type of RFID label paper that can be used inthe RFID label printing device. The RFID label printing device does notperform a printing operation on the label paper with the printing meanswhen determining that the information read from the RFID inlet does notinclude a type code for RFID label paper that can be used on the RFIDlabel printing device.

SUMMARY

With the conventional printing device and tape described above, theprinting device can not only read information from the storage elementprovided on the tape, but also write information to the storage element.However, it is desirable to prevent the printing device from performingunauthorized writing of information to the storaae element provided onthe tape when the tape being used on the printing device is invalid.

Therefore, it is an object of the present disclosure to provide aprinting device and a tape capable of preventing unauthorized writing ofinformation to a storage element provided on a tape.

In order to attain the above and other objects, according to a firstaspect of the present disclosure, there is provided a printing deviceincluding: a supply portion; a printing portion; a reading portion; anda controller. The supply portion is configured to convey a tape in alongitudinal direction thereof. The tape includes: a plurality oflabels; and a plurality of storage elements. The plurality of labels isarranged continuously in the longitudinal direction. The plurality oflabels includes a first label and a second label. The plurality ofstorage elements is provided on respective ones of the plurality oflabels. Each of the plurality of storage elements is configured to storeat least authentication data. The plurality of storage elements includesa first storage element provided on the first label and a second storageelement provided on the second label. The first storage element isconfigured to store first authentication data. The second storageelement is configured to store second authentication data. The printingportion is configured to print on the plurality of labels. The readingportion is configured to read the authentication data from each of theplurality of storage elements. The controller is configured to perform:(a) reading; and (b) determining. The (a) reading reads the firstauthentication data from the first storage element and the secondauthentication data from the second storage element by the readingportion. The (b) determining determines whether the first authenticationdata is correlated to the second authentication data to meet anauthentication condition.

According to a second aspect of the present disclosure, there isprovided a tape including: a plurality of labels; and a plurality ofstorage elements. The plurality of labels is arranged continuously in alongitudinal direction. The plurality of labels includes a first labeland a second label neighboring the first label in the longitudinaldirection. The plurality of storage elements is provided on respectiveones of the plurality of labels. Each of the plurality of storageelements is provided with a first storage area and a second storagearea. The first storage area is configured to store first data inadvance. The second storage area is configured to store second data inadvance. The plurality of storage elements includes a first storageelement provided on the first label and a second storage elementprovided on the second label. The second data stored in the firststorage element is equivalent to the first data stored in the secondstorage element.

According to a third aspect of the present disclosure, there is alsoprovided a tape including: a plurality of labels; and a plurality ofstorage elements. The plurality of labels is arranged continuously in alongitudinal direction. The plurality of labels includes a first label,a second label, and a third label. The second label neighbors the firstlabel in the longitudinal direction. The third label neighbors the firstlabel on an opposite side of the second label in the longitudinaldirection. The plurality of storage elements is provided on respectiveones of the plurality of labels. Each of the plurality of storageelements is provided with a first storage area and a second storagearea. The first storage area is configured to store first data inadvance. The second storage area is configured to store second data inadvance. The plurality of storage elements includes a first storageelement, a second storage element, and a third storage element. Thefirst storage element is provided on the first label. The second storageelement is provided on the second label. The third storage element isprovided on the third label. A first sequence of digits forms a firsttotal value of the second data stored in the first storage element andthe first data stored in the second storage element. A second sequenceof digits forms a second total value of the first data stored in thefirst storage element and the second data stored in the third storageelement. At least part of the first sequence of digits is identical toat least part of the second sequence of digits.

According to a fourth aspect of the present disclosure, there is alsoprovided a tape including: a plurality of labels; and a plurality ofstorage elements. The plurality of labels is arranged continuously in alongitudinal direction. The plurality of labels includes a first labeland a second label neighboring the first label in the longitudinaldirection. The plurality of storage elements is provided on respectiveones of the plurality of labels. Each of the plurality of storageelements being provided with a first storage area and a second storagearea. The first storage area is configured to store authentication datain advance. The second storage area is configured to store a first keyvalue in advance. The plurality of storage elements includes a firststorage element provided on the first label and a second storage elementprovided on the second label. A first sequence of digits forms a firstauthentication value obtained by multiplying the authentication datastored in the first storage element and the authentication data storedin the second storage element. A second sequence of digits forms thefirst key value stored in the second storage element. At least part ofthe first sequence of digits includes at least part of the secondsequence of digits.

BRIEF DESCRIPTION OF THE DRAWINGS

The particular features and advantages of the disclosure as well asother objects will become apparent from the fiAlowing description takenin connection with the accompanying drawings, in which:

FIG. 1 is a perspective view of a printing device according toembodiments of a present disclosure;

FIG. 2 is a plan view of a cassette mounting section of the printingdevice in which a tape cassette is mounted;

FIG. 3 is a block diagram illustrating the electrical configuration ofthe printing device according to the embodiments of the presentdisclosure;

FIG. 4A is a plan view of a tape according to the embodiments of thepresent disclosure, in which a plurality of wireless communication tagsprovided on the tape is illustrated;

FIG. 4B is a conceptual diagram of tag information stored in thewireless communication tags provided on the tape according to a firstembodiment of the present disclosure;

FIG. 5 is a flowchart illustrating steps in a tag confirmation processexecuted by a CPU of the printing device according to the firstembodiment of the present disclosure;

FIG. 6 is a flowchart illustrating steps in a tag writing processexecuted by the CPU of the printing device according to the firstembodiment;

FIG. 7 is a conceptual diagram of tag information stored in wirelesscommunication tags provided on a tape according to a second embodimentof the present disclosure;

FIG. 8 is a flowchart illustrating steps in a tag confirmation processexecuted by a CPU of a printing device according to the secondembodiment;

FIG. 9 is a conceptual diagram of tag information stored in wirelesscommunication tags provided on a tape according to a third embodiment ofthe present disclosure;

FIG. 10 is a flowchart illustrating steps in a tag confirmation processexecuted by a CPU of a printing device according to the thirdembodiment;

FIG. 11 is a conceptual diagram of tag information stored in wirelesscommunication tags provided on a tape according to a fourth embodimentof the present disclosure;

FIG. 12 is a flowchart illustrating steps in a tag confirmation processexecuted by a CPU of a printing device according to the fourthembodiment;

FIG. 13 is a conceptual diagram of tag information stored in wirelesscommunication tags provided on a tape according to a fifth embodiment ofthe present disclosure;

FIG. 14 is a flowchart illustrating part of steps in a tag confirmationprocess executed by a CPU of a printing device according to the fifthembodiment;

FIG. 15 is a flowchart illustrating another part of steps in the tagconfirmation process executed by the CPU of the printing deviceaccording to the fifth embodiment; and

FIG. 16 is a flowchart illustrating the remainder of steps in the tagconfirmation process executed by the CPU of the printing deviceaccording to the fifth embodiment.

DETAILED DESCRIPTION

Next, embodiments of the present disclosure will be described Whilereferring to the accompanying drawings. The referenced drawings are usedto describe the technical features made possible with the presentdisclosure. The configurations of the devices illustrated in thedrawings are merely examples, and the present disclosure is not intendedto be limited to these configurations. In the following description, theupper-right side, lower-left side, lower-right side, upper-left side,top side, and bottom side of a printing device 1 illustrated in FIG. 1will be respectively defined as the right side, left side, front side,rear side, top side, and bottom side of the printing device 1. Further,the top side, bottom side, right side, and left side of a tape 50illustrated in FIG. 4A will be respectively defined as the top side,bottom side, leading end, and trailing end of the tape 50.

As illustrated in FIG. 1, the printing device 1 is provided with a bodycover 2. The body cover 2 is the housing of the printing device 1 andhas a rectangular parallelepiped shape. A keyboard 3 for inputtingcharacters is disposed on the top surface of the body cover 2 in thefront portion thereof. The keyboard 3 includes a power switch, functionkeys, arrow keys, and the like. A display 5 is provided in the topsurface of the body cover 2 to the rear side of the keyboard 3 Thedisplay 5 displays various information. The display 5 may be a dotmatrix LCD, for example. A cassette cover 6 is provided on the rear sideof the display 5. The cassette cover 6 can be opened and closed on thebody cover 2. A discharge opening 9 is formed in the rear portion of theleft side surface of the body cover 2. A printed section of the tape 50is discharged from the body cover 2 through the discharge opening 9.

As illustrated in FIG. 2, a cassette mounting section 8 is providedinside the body cover 2 below the cassette cover 6 (see FIG. 1). Thecassette mounting section 8 is a recessed part having a shape thatcorresponds to the shape or a tape cassette 30. Thus, when the cassettecover 6 is open, the tape cassette 30 can be mounted in or removed fromthe cassette mounting section 8. The printing device 1 prints charactersinputted via the keyboard 3 using the tape cassette 30 mounted in thecassette mounting section 8.

The tape cassette 30 is provided with a box-shaped cassette case 33 foraccommodating a tape 50, an ink ribbon 60, and the like. The unprintedtape 50 is wound around a tape spool 40. The tape spool 40 is rotatablysupported in the left-rear section of the cassette case 33. The unusedink ribbon 60 is wound about a ribbon spool 42. The ribbon spool 42 isrotatably supported in the right-front section of the cassette case 33.A ribbon take-up spool 44 is rotatably supported in the cassette case 33between the tape spool 40 and ribbon spool 42. The ribbon take-up spool44 draws the unused ink ribbon 60 off the ribbon spool 42 and takes upthe ink ribbon 60 after the ink ribbon 60 has been used for printing. Atape drive roller 46 is rotatably supported in the left-front corner ofthe cassette case 33. The tape drive roller 46 draws the tape 50 off thetape spool 40 to be printed and conveys the tape 50. The upstream sideand downstream side in a conveying direction of the tape 50 correspondto the leading end side and trailing end side in a longitudinaldirection of the tape 50, respectively.

Also provided in the cassette mounting section 8 are a ribbon take-upshaft (not illustrated), a tape drive shaft (not illustrated), a thermalhead 10, a platen mechanism 12, a wireless communication reader 16, awireless communication writer 18, and the like. The ribbon take-up shaftis inserted into the ribbon take-up spool 44 and is rotated by the driveof a tape feed motor 23 (see FIG. 3). The tape drive shaft is insertedinto the tape drive roller 46 and is rotated through a transmissionmechanism (not illustrated) by the drive of the tape feed motor 23. Thethermal head 10 is disposed on the right side of the tape drive shaft.The thermal head 10 uses unused ink ribbon 60 to print on the tape 50 asthe tape 50 is conveyed. The platen mechanism 12 presses the tape 50 andink ribbon 60 against the thermal head 10 and conveys the tape 50 andink ribbon 60. A cutting mechanism 17 is disposed between the dischargeopening 9 and the cassette mounting section 8. The cutting mechanism 17cuts the tape 50 at a prescribed position by the drive of a cutter motor24 (see FIG. 3).

The wireless communication reader 16 is disposed on the upstream side ofthe cutting mechanism 17 in the conveying direction of the tape 50. Thewireless communication reader 16 opposes the tape 50 discharged from thetape cassette 30 and is capable of reading data from a wirelesscommunication tag 80 (see FIG. 4) on the tape 50 using near-fieldcommunication. The wireless communication writer 18 is disposed betweenthe discharge opening 9 and the cutting mechanism 17. The wirelesscommunication writer 18 opposes the tape 50 in the region between thedischarge opening 9 and cutting mechanism 17 and is capable of writingdata to the wireless communication tag 80 of the tape 50 usingnear-field communication. In the present embodiment, the wirelesscommunication reader 16 is a well-known radio frequency identification(RFID) reader, and the wireless communication writer 18 is a well-knownRFID writer. The distance between the wireless communication reader 16and wireless communication writer 18 is preferably set larger than theinterval between a plurality of wireless communication tags 80(described later) arranged on the tape 50.

Next, the electrical configuration of the printing device 1 will bedescribed with reference to FIG. 3. The printing device 1 is providedwith a control circuit unit 70. The control circuit unit 70 is providedwith a central processing unit (CPU) 71, a read only memory (ROM) 72, acharacter generator ROlvl (CGROM) 73, a random access memory (RAM) 74, aflash memory 75, and an input/output interface 77, all of whichcomponents are connected via a data bus 69. The CPU 71 performs overallcontrol of the printing device 1. The ROM 72 stores various parametersrequired when the CPU 71 executes various programs. The CGROM 73 storesimage data representing characters to be printed on the tape 50. The RAM74 includes a plurality of memory areas, such as a text memory, a printbuffer, and the like. The flash memory 75 stores various programs thatthe CPU 71 executes, data read from the wireless communication tags 80,data to be written to the wireless communication tags 80, and the like.

The input/output interface 77 is connected to the keyboard 3, a liquidcrystal drive circuit (LCDC) 25, drive circuits 26, 27, and 28, thewireless communication reader 16, and the wireless communication writer18. The wireless communication reader 16 is provided with an antenna(not illustrated) and a reader IC (not illustrated) as is the case witha well-known RFID reader. The wireless communication writer 18 isprovided with an antenna (not illustrated) and a writer IC (notillustrated) as is the case with a well-known RFID writer. The LCDC 25has a video RAM (not illustrated) for outputting display data to thedisplay 5. The drive circuit 26 is an electronic circuit for driving thethermal head 10. The drive circuit 27 is an electronic circuit fordriving the tape feed motor 23. The drive circuit 28 is an electroniccircuit for driving the cutter motor 24.

Next, an overview of the tape 50 will be given while referring to FIG.4A. The tape 50 is a long strip-like sheet that includes a plurality offixed-length labels 51 arranged continuously along the conveyingdirection. When the tape cassette 30 is mounted in the printing device1, the tape 50 is conveyed along this longitudinal direction within theprinting device 1. The thermal head 10 uses the ink ribbon 60 to printcharacters on one surface of the tape 50. The surface on which thethermal head 10 prints will be called the “printing surface.” Thecutting mechanism 17 cuts the tape 50 in units corresponding to thelabels 51. A plurality of the wireless communication tags 80 is providedon the opposite side of the tape 50 from the printing surface. Data canbe read from and written to the wireless communication tags 80 throughwireless communications. The wireless communication tags 80 are arrangedalong the longitudinal direction of the tape 50.

The wireless communication tags 80 in the present embodiment arewell-known RFID tags. Each wireless communication tag 80 has an IC chip81, an antenna 82, and a sealing base material 83. The sealing basematerial 83 is a rectangular sheet. The IC chip 81 and antenna 82 arearranged on the surface of the sealing base material 83. The IC chip 81is provided with a high-frequency circuit, a memory, and a power supplycircuit. The antenna 82 is a coiled antenna wound around the IC chip 81on the sealing base material 83. While the wireless communication tag 80in the present embodiment is a passive RFID tag, an active RFID tag maybe used instead.

The IC chip 81 has a plurality of storage areas capable of storingvarious information. In the present embodiment, a tag identificationarea 101, an address A area 102, an address B area 103, a supplementalinformation area 104, and the like are provided in the chip 81. The tagidentification area 101 stores unique identification data for thecorresponding wireless communication tag 80. The address A area 102 andaddress B area 103 store data used for authenticating the wirelesscommunication tag 80. The address A area 102 and address B area 103 willbe described later in greater detail. The supplemental information area104 stores supplemental data, such as information about the tapecassette 30 (the type of tape, printing color, and tape width, forexample), intbnnation related to the wireless communication tag 80, anyinformation written by the user, and the like. The various informationstored in the wireless communication tag 80 will be collectively calledtag information 100.

In the present embodiment, an RFID writer (not illustrated) is used towrite various information to the plurality of wireless communicationtags 80 when manufacturing the tape 50. The information is written inorder beginning from the wireless communication tag 80 arranged at theleading end side of the tape 50. At this time, ID data is written to thetag identification area 101 of each of the plurality of wirelesscommunication tags 80. The ID data is assigned in ascending orderbeginning from the leading end of the tape 50 and continuing toward thetrailing end. In FIG. 4B, the ID data written to each tag identificationarea 101 is illustrated with a word “No.” added at the beginning. Validdata used for authenticating each wireless communication tag 80 iswritten to the corresponding address A area 102 and address B area 103.Supplemental data is written to the supplemental information area 104.The supplemental data specifies a unique manufacturing date and time(hours, minutes, and seconds precise to four decimal places) for thewireless communication tag 80.

In the present embodiment, the wireless communication tags 80 arearranged at regular intervals along the longitudinal direction of thetape 50 (i.e., the conveying direction) such that one wirelesscommunication tag 80 is provided for each label 51. In FIG. 4A, thethree labels 51 arranged on the tape 50 from the downstream end to theupstream side of the conveying direction will be called labels 51A, 51B,and 51C. The wireless communication tags 80 provided on the respectivelabels 51A, 51B, and 51C are called wireless communication tags 80A,80B, and 80C. The tag information 100 stored on each of the wirelesscommunication tags 80A, 80B, and 80C is respectively called taginformation 100A, 100B, and 100C.

In the label 51A (wireless communication tag 80A) at the leading end ofthe tape 50, a “1” is stored in the tag identification area 101. This“1” is the smallest ID data. The ID data “2” is stored in the tagidentification area 101 of the second label 51B (wireless communicationtag 80B), and the ID data “3” is stored in the tag identification area101 of the third label 51C (wireless communication tag 80C). As this IDdata grows larger in the wireless communication tags 80A, 80B, and 80C,the supplemental data stored in the corresponding supplementalinformation area 104 indicates a later manufacturing date and time.

First Embodiment

Next, the tape 50 according to a first embodiment will be described indetail with reference to FIGS. 4A and 4B. In the following description,authentication data stored in the address A area 102 of the wirelesscommunication tag 80 will be called A data, and authentication datastored in the address B area 103 of the wireless conununication tag 80will be called B data. A data and B data are written to each wirelesscommunication tag 80 in advance in conformance with the following rule.

The B data stored on the wireless communication tag 80 provided in afirst label, where the first label is an arbitrary label 51, is the sameas the A data stored in the wireless communication tag 80 provided on asecond label neighboring the first label in the longitudinal direction(i.e., the conveying direction) of the tape 50. Similarly, the A datastored in the wireless communication tag 80 provided on the first labelis equivalent to the B data stored in the wireless communication tag 80provided on a third label neighboring the first label from the side ofthe first label opposite the second label.

The above rule will be described using the example illustrated in FIGS.4A and 4B. In FIG. 4A, the label 51B will be the first label, the label51C the second label, and the label 51A the third label. The wirelesscommunication tags 80A through 80C provided on the third, first andsecond labels store the tag information 100A through 100C, respectively.In this example, as illustrated in FIG. 4B, both the B data in the taginformation 100A and the A data in the tag information 100B are “0010”.Similarly, the B data in the tag information 100B and the A data in thetag information 100C are also equivalent at “0011”. In other words, theB data in an arbitrary label 51 is the same as the A data in the label51 neighboring this arbitrary label 51 from the upstream side in theconveying direction (trailing end side in the longitudinal direction) ofthe tape 50 according to the first embodiment.

In the first embodiment, A data and B data should be calculated tosatisfy the above rule and should be written to the correspondingaddress A areas 102 and address B areas 103 in the plurality of wirelesscommunication tags 80 provided on the tape 50 when the tape 50 is beingmanufactured. It is preferable that the combination of A data and B datastored in any one of the plurality of wireless communication tags 80differs from the combinations of A data and B data stored in all otherwireless communication tags 80.

Next, a read/write control process according to the first embodimentwill be described with reference to FIGS. 5 and 6. The printing device 1executes the read/write control process in association with a processfor conveying and printing the tape 50. The read/write control processis performed while a tape cassette 30 is mounted in the cassettemounting section 8 in order to read information from a wirelesscommunication tag 80 and to write information to the wirelesscommunication tag 80. The read/write control process includes a tagconfirmation process (see FIG. 5), and a tag writing process (see FIG.6). The CPU 71 of the printing device 1 executes these processesaccording to programs stored in the ROM 72 when the power to theprinting device 1 is turned on.

As illustrated in FIG. 5, in S1 of the tag confirmation processaccording to the first embodiment, the CPU 71 first determines whether awireless communication tag 80 is recognizable. The CPU 71 determinesthat a wireless communication tag 80 is recognizable, when the wirelesscommunication reader 16 can detect a wireless communication tag 80during the period that the tape 50 is conveyed a prescribed distance.When a wireless communication tag 80 is recognizable (S1: YES), in S3the CPU 71 controls the wireless communication reader 16 to read taginformation 100 from the wireless communication tag 80 detected in S1.Here, the wireless communication tag 80 detected in S1 will be called atag N. The CPU 71 stores the tag information read from the tag N in theflash memory 75. The CPU 71 also stores a variable N in the flash.memory 75 indicating the ID data read from the tag N. The variable N isset to correspond to the ID data read from the tag N in S3. The tag N isthe most recent wireless communication tag 80 detected by the wirelesscommunication reader 16, and the ID data stored in the tagidentification area 101 of this wireless communication tag 80 will becalled “N”.

In the example illustrated in FIGS. 4A and 4B, the first wirelesscommunication tag 80 detected by the wireless communication reader 16immediately after the printing device 1 is turned on is the wirelesscommunication tag 80A provided on the label 51A. Since the wirelesscommunication tag 80A stores the ID data “1” in the tag identificationarea 101, the tag information 100 for tag “1” is stored in the flashmemory 75 and the variable N is set to “1” (S3). As the tape 50 isconveyed thereafter, the tag information 100 is read from each wirelesscommunication tag 80 in sequence and stored in the flash memory 75, andthe variable N is updated to reflect the most recent ID data (S3). Thevariable N would be incremented by one from the latest value each timethe tag information is read from a newly-detected wireless communicationtag 80.

In S5 the CPU 71 determines whether the tag information 100 for tag(N−1) is stored in the flash memory 75. Tag (N−1) denotes the wirelesscommunication tag 80 having ID data of a value obtained by subtractingone from variable N in the flash memory 75 (i.e., N−1). In other words,tag (N−1) denotes the wireless communication tag 80 read just prior tothe latest tag N. In the example illustrated in FIGS. 4A and 4B, tag(N−1) immediately after power to the printing device 1 was turned onwould correspond to a wireless communication tag 80 having the ID data“0”, but a tag with the ID data “0” does not exist on the tape 50 (S5:NO). In this case, the CPU 71 returns to Si.

If tag information 100 in tag (N−1) exists in the flash memory 75 (S5:YES), in S7 the CPU 71 determines whether the B data in tag (N−1) isequivalent to the A data in tag N. Specifically, the CPU 71 determineswhether the B data included in the tag information 100 stored in theflash memory 75 for tag (N−1) is the same as the A data included in thetag information 100 stored in the flash memory 75 for tag N.

If the B data in tag (N−1) is equivalent to the A data in tag N (S7:YES), tag (N−1) is considered to be a valid wireless communication tag80. In S9 the CPU 71 stores a write permission flag in the flash memory75 for tag (N−1) and sets the flag to “1”. The write permission flagspecifies whether information can be written to the correspondingwireless communication tag 80, with a “1” indicating that writing ispermitted and a “0” indicating that writing is prohibited,

However, if the B data in tag (N−1) differs from the A data in tag N(S7: NO), tag (N−1) may be an invalid wireless communication tag 80.Accordingly, in S11 the CPU 71 stores a write permission flag in theflash memory 75 for tag (N−1) and sets this flag to “0”. Aftercompleting step S9 or S11, the CPU 71 returns to S1. Each time the aboveprocess in S5 through S11 is executed, a write permission flag is storedin the flash memory 75 for the wireless communication tag 80 read justprior to the latest tag N.

Note that when the wireless communication reader 16 does not detect awireless communication tag 80 (S1: NO), in S13 the CPU 71 determineswhether the tag information for tag N is stored in the flash memory 75.Tag N denotes the wireless communication tag 80 having ID data of avalue of variable N in the flash memory 74. In other words, tag Ndenotes the last detected wireless communication tag 80. If taginformation 100 for tag N exists (S13: YES), the tag N whose taginformation 100 was last read is considered the wireless communicationtag 80 provided on the trailing end of the tape 50. Therefore, in S15the CPU 71 sets the write permission flag for tag N to “1” in the flashmemory 75 according to the same inethod described in S9. Aftercompleting S15 or if the tag information 100 for tag N does not exist inthe flash memory 75 (S13: NO), the CPU 71 ends the tag confirmationprocess. Similarly, if a variable N is not stored in the flash memory 74in S13, the CPU 71 ends the tag confirmation process.

As illustrated in FIG. 6, in S101 of the tag writing process accordingto the first embodiment, the CPU 71 first determines whether a wirelesscommunication tag 80 has been detected. The CPU 71 determines that awireless communication tag 80 has been detected when the wirelesscommunication writer 18 has detected one of the plurality of wirelesscommunication tags 80 provided on the tape 50. If a wirelesscommunication tag 80 has been detected (S101: YES), in S103 the CPU 71determines whether the write permission flag for the detected wirelessconummication tag 80 (hereinafter called the detected tag) is “1”.Specifically, the CPU 71 reads the ID data from the tag identificationarea 101 for the detected tag. The CPU 71 references the flash memory 75to identify the write permission flag in the detected tag correspondingto the ID data read from the tag identification area 101 and determineswhether the write permission flag is “1”.

When the write permission flag in the detected tag is “1” (S103: YES),in S105 the CPU 71 reads target information from the flash memory 75 andwrites the target information to the detected tag using the wirelesscommunication writer 18. The target information is information to bewritten to the wireless communication tag 80. The user may havepreviously inputted this information via the keyboard 3 or the like, forexample. Examples of target information are information specifying thecreator or purpose of the label 51, and information about the product towhich the label 51 will be affixed.

In S107 the CPU 71 determines whether the A data and B data stored inthe detected tag remain unchanged by comparing the current data to thedata prior to the execution of S105. If the A data and B data remainunchanged (S107: YES), in S109 the CPU 71 modifies the A data and B datain the detected tag. Specifically, the CPU 71 controls the wirelesscommunication writer 18 to add a prescribed value (“1”, for example) tothe A data stored in the address A area 102 of the detected tag and toadd a prescribed value (“1”, for example) to the B data stored in theaddress B area 103 of the detected tag. By modifying A data and B datain the detected tag in this way, the CPU 71 can prevent invalidinformation updates to the detected tag.

After completing the process in S109, the CPU 71 returns to S101. TheCPU 71 also returns to S101 when determining that a wirelesscommunication tag 80 has not been detected (S1.01: NO), when determiningthat the write permission flag in the detected tag is not “1” (S103:NO), or when determining that one or both of the A data and B data inthe detected tag has been modified (S107: NO).

Next, a specific example of the readhArrite control process according tothe first embodiment will be described with reference to FIGS. 4A and4B. In this example, the tag information 100A through 100C issequentially read from labels 51A through 51C (the wirelesscommunication tags 80A through 80C) by the wireless communication reader16 as the tape 50 is conveyed during printing operations. At the timingthat the tag information 100B is read, the variable N stored in theflash memory 75 is “2” (S1: YES, S3). In this case, the CPU 71determines in S5 that both the B data in the tag information 100.A andthe A data in the tag information 100B are “0010”. Since the data areequivalent (S5: YES, S7: YES), in S9 the CPU 71 sets the writepermission flag in the wireless communication tag 80A to “1”.

When the wireless communication writer 18 subsequently detects thewireless communication tag 80A, the write permission flag in thewireless communication tag 80A is “1”. Accordingly, the wirelesscommunication writer 18 is controlled to write target information to thewireless communication tag 80A (S101: YES, S103: YES, S105). If the Adata and B data in the wireless communication tag 80A remain unchangedafter step S105, the CPU 71 executes the process to modify the A dataand B data (S107: YES, S109).

Second Embodiment

Next, the tape 50 according to a second embodiment will be describedwith reference to FIG. 7. The tape 50 according to the second embodimentis similar to that in the first embodiment (see FIGS. 4A and 4B), butdiffers according to the rule by which A data and B data are written tothe wireless communication tags 80 in advance. This rule is describedbelow. Note that tag information 110 stored in each of the wirelesscommunication tags 80A, 80B, and 80C will be respectively called taginformation 110A, 110B, and 1100 in the second embodiment.

The plurality of labels 51 includes a first label, a second label, and athird label. The first label, second label, and third label constituteany three labels 51 that neighbor each other in the longitudinaldirection (i.e., the conveying direction) of the tape 50, as describedin the first embodiment. More specifically, in the present embodiment,the second label neighbors the first label in the longitudinal directionof the tape 50, and the third label neighbors the first label from theside opposite the second label.

At least part of the sum of B data stored in the wireless communication.tag 80 provided on the first label and A data stored in the wirelesscommunication tag 80 provided on the second label is equivalent to atleast part of the sum of A data stored in the wireless communication tag80 provided in the first label and B data stored in the wirelesscommunication tag 80 provided on the third label. This will be describedmore in detail.

In the present embodiment, both A data and B data stored in eachwireless communication tag 80 are composed of a plurality of digits. Thesum (first sum) of B data stored in the wireless communication tag 80provided on the first label and A data stored in the wirelesscommunication tag 80 provided on the second label is also composed of aplurality of digits, and the sum (second sum) of A data stored in thewireless communication tag 80 provided on the first label and B datastored in the wireless communication tag 80 provided on the third labelis also composed of a plurality of digits. In other words, a sequence ofa plurality of digits (first sequence of digits) forms the first sum,and another sequence of a plurality of digits (second sequence ofdigits) forms the second sum. In the present embodiment, at least partof the first sequence of digits are respectively identical to at leastpart of the second sequence of digits. The first sum is an example ofthe first total value of the present disclosure, and the second sum isan example of the second total value of the present disclosure.

The above rule will be described using the example illustrated in FIGS.4A and 7. In FIG. 4A the label 51B will be the first label, the label51C the second label, and the label 51A the third label. The wirelesscommunication tags 80A through 80C provided on the third, first, andsecond labels store the tag information 110A through 110C illustrated inFIG. 7. In this example, the sum of B data “0011” in the tag information110B and A data “1100” in the tag information 110C will be called thefirst sum, and the sum of A data “1101” in the tag information 110B andB data “0010” in the tag information 110A will be called the second sum.The first sum and the second sum are both “1111” and, hence, areequivalent. In other words, all the digits that make up the first sumfully match all the digits that make up the second sum.

In the second embodiment, A data and B data should be calculated tosatisfy the above rule and should be written to the correspondingaddress A areas 102 and address B areas 103 in the plurality of wirelesscommunication tags 80 provided on the tape 50 when the tape 50 is beingmanufactured. It is preferable that the combination of A data and B datastored in any one of the plurality of wireless communication tags 80differs from the combinations of A data and B data stored in all otherwireless communication tags 80.

Next, the read/write control process according to the second embodimentwill be described with reference to FIG. 8. The tag confirmation processof the second embodiment differs from that in the first embodiment (seeFIG. 5) in that step S17 is executed in place of step S7. Hence, in S17the CPU 71 determines whether the sum of B data in tag (N−1) and A datain tag N is equivalent to a prescribed value. Specifically, the CPU 71calculates the sum of B data included in the tag information 110 storedin the flash memory 75 for tag (N−1) and A data included in the taginformation 110 stored in the flash memory 75 for tag N. Next, the CPU71 determines whether the calculated sum is equivalent to a prescribedvalue pre-stored in the ROM 72.

In S17 the CPU 71 may determine whether at least part of a sequence ofdigits forming the calculated sum are identical to at least part of asequence of digits forming a prescribed value pre-stored in the ROM 72.

If the calculated sum is equivalent to the prescribed value (S17: YES),in S9 the CPU 71 sets the write permission flag for tag (N−1) to “1”. Ifthe calculated sum is not equivalent to the prescribed value (S17: NO),in S11 the CPU 71 sets the write permission flag for tag (N−1) to “0”.The remainder of the tag confirmation process is identical to that inthe first embodiment (see FIG. 5). The tag writing process according tothe second embodiment is identical to that described in the firstembodiment (see FIG. 6).

Next, a specific example of the read/write control process according tothe second embodiment will be described with reference to FIGS. 4A and7. In this example, the wireless communication reader 16 sequentiallyreads the tag information 110A through 1100 from the labels 51A through51C (the wireless communication tags 80A through 80C) while the tape 50is being conveyed in a printing operation. At the timing after the taginformation 110B was read, the variable N stored in the flash memory 75is “2” (S1: YES, S3). In this case, the CPU 71 calculates the sum of theB data “0010” in the tag information 110A and the A data “1101” in thetag information 110B to be “1111”. Since this sum is equivalent to theprescribed value “1111” pre-stored in the ROM 72 (S5: YES, S17: YES),the CPU 71 sets the write permission flag for the wireless communicationtag 80A to “1” (S9). Thereafter, target information is written to thewireless communication tag 80A as described in the first embodiment.

Third Embodiment

Next, the tape 50 according to a third embodiment will be described withreference to FIG. 9. The tape 50 according to the third embodiment issimilar to that in the first embodiment (see FIGS. 4A and 4B), butdiffers according to the rule by which A data and B data are written tothe wireless communication tags 80 in advance. This rule is describedbelow. Note that tag information 120 stored in each of the wirelesscommunication tags 80A, 80B, and 80C will be respectively called taginformation 120A, 120B, and 120C in the third embodiment. In addition,one hundred wireless communication tags 80 are provided on the tape 50according to the third embodiment. The tag information 120 stored in thelast wireless communication tag 80 provided on the trailing end side inthe longitudinal direction of the tape 50 will be called tag information1202.

A data stored in a wireless communication tag 80 provided in any label51 among the plurality of labels 51 is equivalent to at least part ofsupplemental data stored in the wireless communication tag 80 of thesame label 51. In other words, supplemental data stored in asupplemental information area 104 of each wireless communication tag 80is composed of a plurality of digits, and A data stored in an address Aarea 102 of each wireless communication tag 80 is identical to at leastpart of a sequence of the digits forming the supplemental data stored inthe supplemental information area 104 of the same wireless communicationtag 80.

At least part of the product obtained by multiplying A data stored in awireless communication tag 80 provided in any arbitrary first labelamong the plurality of labels 51 by A data stored in a wirelesscommunication tag 80 provided on the second label neighboring the firstlabel in the longitudinal direction of the tape 50 (i.e., the conveyingdirection) is equivalent to at least part of B data stored in thewireless communication tag 80 on the first label. In other words, theproduct obtained by multiplying the A data stored in the wirelesscommunication tag 80 on the first label by the A data stored in thewireless communication tag 80 on the second label is formed by asequence of digits (first sequence of digits). This sequence of digitsincludes at least part of a sequence of digits (second sequence ofdigits) forming B data stored in the wireless communication tag 80 onthe first label.

Additionally, the labels 51 include a third label neighboring the firstlabel on the side opposite the second label in the longitudinaldirection. At least part of the product obtained by multiplying A datastored in the wireless communication tag 80 on the first label and Adata stored in the wireless communication tag 80 on the third label isequivalent to at least part of the B data stored in the wirelesscommunication tag on the third label. In other words, the productobtained by multiplying the A data stored in the wireless communicationtag 80 on the first label by the A data stored in the wirelesscommunication tag 80 on the third label is formed by a sequence ofdigits (third sequence of digits). This sequence of digits includes atleast part of a sequence of digits (fourth sequence of digits) forming Bdata stored in the wireless communication tag 80 on the third label.

The above rule will be described using the example illustrated in FIGS.4A and 9. In FIG. 4A, the label 51B will be the first label, the label51C the second label, and the label 51A the third label. The wirelesscommunication tags 80B, 80C, and 80A provided on the first through thirdlabels respectively store the tag information 120B, 120C, and 120Aillustrated in FIG. 9. In this example, the four digits of the A data“0016” in the tag information 120A are respectively identical to thelast four digits “0016” of the supplemental data in the tag information120A (the four digits to the right of the decimal for seconds).Similarly, the four digits of the A data “1232” in the tag information120B are respectively identical to the last four digits “1232” of thesupplemental data in the tag information 120B, and the four digits ofthe A data “2448” in the tag information 120C are respectively identicalto the last four digits “2448” of the supplemental data in the taginformation 120C.

In addition, the product of the A data “16” in the tag information 120Aand the A data “1232” in the tag information 120B is a first product“19712”. The last four digits of the first product are respectivelyidentical to the B data “9712” in the tag information 120A. Further, thenroduct of the A data in the tag information 120B and the A data in thetag information 120C is the second product “3015936”. The last fourdigits of the second product are respectively equivalent to the B data“5936” in the tag information 120B.

In the third embodiment, A data and B data should be calculated tosatisfy the above rule and should be written to the correspondingaddress A areas 102 and address B areas 103 in the plurality of wirelesscommunication tags 80 provided on the tape 50 when the tape 50 is beingmanufactured. Specifically, the supplemental data should be written tothe supplemental information area 104 and at least part of thissupplemental data (the last four digits in this example) should bewritten to the address A area 102 while the tape 50 is beingmanufactured. Further, at least part of the product of A data in any twoneighboring wireless communication tags 80 (the last four digits in thisexample) should be written to the address B area 103 in the wirelesscommunication tag 80 provided on the leading end side in thelongitudinal direction (i.e., on the downstream side in the conveyingdirection) of the tape 50. In the example of FIG. 9, the value “0” iswritten as an end marker to the address B area 103 of the taginformation 120Z stored in the last wireless communication tag 80.

Next, the read/write control process according to the third embodimentwill be described with reference to FIG. 10. The tag confirmationprocess of the third embodiment differs from that in the firstembodiment (see FIG. 5) in that step S27 is executed in place of stepS7. Hence, in S27 the CPU 71 determines whether the product of the Adata in tag (N−1) and the A data in tag N is equivalent to the B data intag (N−1). Specifically, the CPU 71 calculates the product of A dataincluded in the tag information 120 stored in the flash memory 75 fortag (N−1) and A data included in the tag information 120 stored in theflash memory 75 for tag N. Next, the CPU 71 determines whether at leastpart of the calculated product is equivalent to the B data included inthe tag information 120 for tag (N−1). In other words, the CPU 71determines whether the B data included in the tag information 120 fortag (N−1) is identical to part of a sequence of digits forming thecalculated product.

If the calculated product is equivalent to the B data in tag (N−1) (S27:YES), in S9 the CPU 71 sets the write permission flag for tag (N−1) to“1”. Here, the expression “the calculated product is equivalent to the Bdata in tag (N−1)” means that at least part of a sequence of digitsforming the calculated product are respectively identical to at leastpart of the B data in tag (N−1). If the calculated product is notequivalent to the B data in tag (N−1) (S27: NO), in SII the CPU 71 setsthe write permission flag for tag (N−1) to “0”. The remainder of the tagconfirmation process is identical to that in the first embodiment (seeFIG. 5). The tag writing process according to the third embodiment isidentical to that in the first embodiment (see Fig, 6). Note that if theend marker “0” is read from the address B area 103 in S3, the CPU 71 mayadvance to S15 immediately after the write permission flag for tag (N−1)is set in S9 or S11.

Next, a specific example of the read/write control process according tothe third embodiment will be described with reference to FIGS. 4A and 9.In this example, the wireless communication reader 16 sequentially readsthe tag information 120A through 120C from the labels 51A through 51C(the wireless communication tags 80A through 80C) while the tape 50 isbeing conveyed in a printing operation. At the timing after the taginformation 120B was read, the variable N stored in the flash memory 75is “2” (S1: YES, S3). In this case, the CPU 71 calculates the product ofthe A data “16” in the tag information 120A and the A data “1232” in thetag information 120B to be “19712”. The last four digits of this productare respectively equivalent to the B data “9712” in the tag information120A (S5: YES, S27: YES). Accordingly, in S9 the CPU 71 sets the writepermission flag for the wireless communication tag 80A to “1”.Thereafter, target information is written to the wireless communicationtag 80A, as described in the first embodiment.

Fourth Embodiment

Next, the tape 50 according to a fourth embodiment will be describedwith reference to FIG. 11. The tape 50 according to the fourthembodiment is similar to that in the first embodiment (see FIGS. 4A and4B), but differs according to the following point. In the fourthembodiment, tag information 130 stored on each of the wirelesscommunication tags 80A, 80B, and 80C will respectively be called taginformation 130A, 130B, and 130C. Further, one hundred wirelesscommunication tags 80 are provided on the tape 50 according to thefourth embodiment. The tag information 130 stored in the last wirelesscommunication tag 80 will be called tag information 130Z.

Unlike the embodiments described above (see FIGS. 4A and 4B), when thetape 50 is manufactured according to the fourth embodiment, an RFIDwriter (not illustrated) writes various information to the plurality ofwireless communication tags 80 in order, beginning from the wirelesscommunication tag 80 disposed at the trailing end. At this time, ID datais written to the tag identification areas 101 of the plurality ofwireless communication tags 80. The ID data is assigned in ascendingorder from the trailing end toward the leading end of the tape 50. Validdata used fbr authenticating each wireless communication tag 80 iswritten to the corresponding address A area 102 and address B area 103.Supplemental data is written to the supplemental information area 104.The supplemental data specifies a unique manufacturing date and time(hours, minutes, and seconds precise to four decimal places) for thewireless communication tag 80.

For example, the value “100”, which is the largest ID data, is stored inthe tag identification area 101 of the label 51A (the wirelesscommunication tag 80A) at the leading end of the tape 50, The ID data“99” is stored in the tag identification area 101 of the label 51B (thewireless communication tag 80B), and the ID data “98” is stored in thetag identification area 101 of the label 51C (the wireless communicationtag 80C). As the ID data grows smaller in the wireless communicationtags 80A, 80B, and 80C, the supplemental data stored in thecorresponding supplemental information area 104 indicates a latermanufacturing date and time. In this example, “0” has been written as anend marker to the address B area 103 of the tag information 130Z that isstored in the last wireless communication tag 80.

In the tape 50 according to the fourth embodiment, k data and B data arewritten to the wireless communication tags 80 in advance in conformancewith the same rule described in the third embodiment (see FIG. 9). InFIG. 4, the label 51B will be the first label, the label 51C the secondlabel, and the label 51A the third label. In this example, the wirelesscommunication tag 80B, wireless communication tag 80C, and wirelesscommunication tag 80A provided on the first through third labelsrespectively store the tag information 130B, tag information 130C, andtag information 130A illustrated in FIG. 11. The A data and B datastored in the tag information 130A through 130C follow the same rule asin the third embodiment (the tag information 120A through 120C).

Next, the read/write control process according to the fourth embodimentwill be described with reference to FIG. 12. In S31 of the tagconfirmation process according to the fourth embodiment, the CPU 71first determines whether a wireless communication tag 80 isrecognizable, as in S1 of the first embodiment. If a wirelesscommunication tag 80 can be recognized (S31: YES), in S33 the CPU 71reads the tag information from a tag N, as described in S3 of the firstembodiment.

In S35 the CPU 71 determines Whether the tag information 130 for tag(N+1) is stored in the flash memory 75. Tag (N+1) denotes the wirelesscommunication tag 80 having ID data for the value obtained by adding oneto the variable N in the flash memory 75 (i.e., N+1). In other words,tag (N+1) denotes the wireless communication tag 80 read just prior tothe latest tag N. In the example illustrated in FIG. 11, tag (N+1)immediately after power to the printing device 1 was turned oncorresponds to a wireless communication tag 80 having ID data “101”, buta wireless communication tag 80 with the ID data “101” does not exist onthe tape 50 (S35: NO). In this case, the CPU 71 returns to S31.

If tag information 130 for tag (N+1) exists in the flash memory 75 (S35:YES), in S37 the CPU 71 determines whether the product of the A data intag (N+1) and the A data in tag N is equivalent to the B data in tag(N+1). Here, the expression “the product of A data in tag (N+1) and theA data in tag N is equivalent to the B data in tag (N+1)” means that atleast part of a sequence of digits forming the product of A data in tag(N+1) and the A data in tag N are respectively identical to at leastpart of the B data in tag (N+1). If the calculated product is equivalentto the B data in tag (N+1) (S37: YES), in S39 the CPU 71 sets the writepermission flag for tag (N+1) to “1” in the flash memory 75. If thecalculated product is not equivalent to the B data for tag (N+1) (S37:NO), in S41 the CPU 71 sets the write permission flag for tag (N+1) to“0” in the flash memory 75. After completing step S39 or S41, the CPU 71returns to S31.

When a wireless communication tag 80 cannot be recognized (S31: NO), inS43 the CPU 71 determines whether the tag information 130 for tag Nexists in the flash memory 75. If the tag information 130 exists for tagN (S43: YES), in S45 the CPU 71 sets the write permission flag for tag Nto “1”. After executing the process in S45, when the tag information 130for tag N does not exist in the flash memory 75, or a variable N is notstored in the flash memory 74 (S43: NO), the CPU 71 ends the tagconfirmation process.

The tag writing process according to the fourth embodiment is identicalto that in the first embodiment (see FIG. 6). In the tag confirmationprocess according to the fourth embodiment illustrated in FIG. 12, whenthe end marker “0” is read from the address B area 103 in S33, the CPU71 may advance to S45 immediately after the write permission flag fortag (N−1) is set in S39 or S41.

Next, a specific example of the read/write control process according tothe fourth embodiment will be described with reference to FIGS. 4A and11. In this example, the wireless communication reader 16 sequentiallyreads the tag information 130A through 130C from the labels 51A through51C (the wireless communication tags 80A through 80C) while the tape 50is being conveyed in a printing operation. At the timing after the taginformation 130B was read, the variable N stored in the flash memory 75is “99” (S31: YES, S33). In this case, the CPU 71 calculates the productof the A data “16” in the tag information 130A and the A data “1232” inthe tag information 130B to be “19712”, The last four digits of thisproduct are respectively identical to the B data “9712” in the taginformation 130A (S35: YES, S37: YES). Accordingly, in S39 the CPU 71sets the write permission flag for the wireless communication tag 80A to“1”. Thereafter, target information is written to the wirelesscommunication tag 80A, as described in the first embodiment.

Fifth Embodiment

Next, the tape 50 according to a fifth embodiment will be described withreference to FIG. 13. The tape 50 according to the fifth embodiment issimilar to that in the first embodiment (see FIGS. 4A and 4B), butdiffers according to the following point. In the fifth embodiment, taginformation 140 stored on each of the wireless communication tags 80A,80B, and 80C will respectively be called tag information 140A, 140B, and140C. Additionally, tag information 140 stored on the fourth wirelesscommunication tag 80 on the upstream side of the wireless communicationtag 80C in the conveying direction of the tape 50 will be called taginformation 140D. Further, one hundred wireless communication tags 80are provided on the tape 50 according to the fifth embodiment. The taginformation 140 stored in the last wireless communication tag 80 will becalled tag information 140Z.

In the fifth embodiment, a tag identification area 201, an address Aarea 202, an address B area 203, an address C area 204, a supplementalinformation area 205, and the like are provided in the IC chip 81. Thetag identification area 201 and supplemental information area 205 areidentical to the tag identification area 101 and supplementalinformation area 104 in the previous embodiments. The address A area202, address B area 203, and address C area 204 store data used forauthenticating the wireless communication tag 80. In the followingdescription, the authentication data stored in the address A area 202will be called A data; authentication data stored in the address B area203 will be called B data; and authentication data stored in the addressC area 204 will be called C data. The A data, B data, and C data arewritten to the wireless communication tag 80 in advance in conformancewith the following rule.

At least part of the product obtained, by multiplying the A data storedin the wireless communication tag 80 provided in any arbitrary firstlabel among the plurality of labels 51 by A data stored in the wirelesscommunication tag 80 provided on the second label neighboring the firstlabel in the longitudinal direction (i.e., the conveying direction) isequivalent to at least part of the B data stored in the wirelesscommunication tag 80 of the first label and at least part of the C datastored in the wireless communication tag 80 of the second label. Thelabels 51 also include a third label that neighbors the first label inthe longitudinal direction on the side opposite the second label. Atleast part of the product obtained by multiplying A data stored in thewireless communication tag 80 of the first label and A data stored inthe wireless communication tag 80 of the third label is equivalent to atleast part of the C data stored in the wireless communication tag 80 ofthe first label and at least part of the B data stored in the wirelesscommunication tag 80 of the third label.

The above rule will be described using the example illustrated in FIGS.4A and 13. In FIG. 4A, the label 51B will be the first label, the label51C the second label, and the label 51A the third label. In this ease,the wireless communication tags 80B, 80C, and 80A provided on the firstthrough third labels respectively store the tag information 140B, 140C,and 140A illustrated in FIG. 13. In this case, the product of the A data“40” in the tag information 140B, which is the thur digits (“0040”) tothe right of the decimal for seconds in supplemental data stored in thesupplemental information area 205 of the same tag information 140B, andthe A data “7534” in the tag information 140C, which is the four digitsto the right of the decimal for seconds in supplemental data stored inthe supplemental information area 205 of the same tag information 140C,is a first product “301360”. The last four digits of the first productare respectively identical to the B data “1360” in the tag information140B. Further, the product of the A data “40” in the tag information140B, which is the four digits (“0040”) to the right of the decimal forseconds in the supplemental data stored in the supplemental informationarea 205 of the same tag inthrmation 140B, and the A data “2546” in thetag information 140A, which is the four digits to the right of thedecimal for seconds in supplemental data stored in the supplementalinformation area 205 of the same tag information 140A, is a secondproduct “101840”. The last four digits of the second product arerespectively identical to the C data “1840” in the tag information 140B.

Note that last four digits of the first product are also respectivelyidentical to the C data “1360” in the tag information 140C, and the lastfour digits of the second product are also respectively identical to theB data “1840” in the tag information 140A. The first product is anexample of the first authentication value of the present disclosure, andthe second product is an example of the second authentication value ofthe present disclosure.

In the fifth embodiment, as in the fourth embodiment described above(see FIG. 11), an RFID writer (not illustrated) writes variousinformation to the plurality of wireless communication tags 80 in order,beginning from the wireless communication tag 80 disposed at thetrailing end of the tape 50 when the tape 50 is being manufactured. Atthis time, A data, B data, and C data should be calculated to satisfythe above rule and should be written to the corresponding address Aareas 202, address B areas 203, and address C areas 204 of the wirelesscommunication tags 80 provided on the tape 50.

Specifically, the supplemental data should be written to thesupplemental information area 205, and at least part of thissupplemental data (the last four digits in this example) should bewritten to the address A area 202 as A data while the tape 50 is beingmanufactured. Further, at least part of the first product obtained bymultiplying A data in two neighboring wireless communication tags 80(the last four digits in this example) should be written to the addressB area 203 in the wireless communication tag 80 on the leading end sidein the longitudinal direction (on the downstream side of the conveyingdirection) of the tape 50 as B data. Similarly, at least part of thesecond product obtained by multiplying A data in two neighboringwireless communication tags 80 (the last four digits in this example)should be written to the address C area 204 in the wirelesscommunication tag 80 on the trailing end side in the longitudinaldirection (on the upstream side of the conveying direction) of the tape50 as C data.

Note that a second label will not exist when the label 51 on thetrailing end is the first label since no label 51 exists fartherupstream from the first label in the conveying direction. In this case,the first product cannot be calculated because no A data is stored inthe wireless communication tag 80 of a second label. In other words, Bdata to be written to the wireless communication tag 80 of the firstlabel cannot be calculated. Therefore, in this example the value “0” iswritten as an end marker to the address B area 203 of the taginformation 140Z stored in the last wireless communication tag 80.

In addition, a third label does not exist when the label 51A on theleading end of the tape 50 is the first label since a label 51 does notexist farther downstream than the first label in the conveyingdirection. In this case, the second product cannot be calculated becauseno A data is stored in the wireless communication tag 80 of a thirdlabel. In other words. C data to be written to the wirelesscommunication tag 80 on the first label cannot be calculated. Therefore,in this example the value “0” is written as a start marker to theaddress C area 204 of the tag information 140A stored in the firstwireless communication tag 80.

Next, the read/write control process according to the fifth embodimentwill be described with reference to FIGS. 14 through 16. In S51 of thetag confirmation process according to the fifth embodiment, the CPU 71first determines whether a wireless communication tag 80 isrecognizable, as in S31 of the fourth embodiment. If a wirelesscommunication tag 80 can be recognized (S51: YES), in S53 the CPU 71reads the tag infbrmation 140 from a tag N, as described in S33 of thefourth embodiment.

In S55 the CPU 71 determines whether the tag information 140 for bothtag (N+1) and tag (Nα2) is stored in the flash memory 75. Tag (N+2)denotes the wireless communication tag 80 having ID data for the valueobtained by adding two to the variable N in the flash memory 75 (i.e.,N+2), In other words, tag (N+2) denotes the wireless communication tag80 read two times prior to the latest tag N. If tag information 140 doesnot exist for both tag (N+1) and tag (N+2) (555: NO), the CPU 71advances to S83. The process in S83 through S93 illustrated in FIG. 16will be described later.

If tag information 140 does exist in the flash memory 75 for both tag(N+1) and tag (N+2) (S55: YES), in 557 the CPU 71 calculates a firstproduct X1 by multiplying. the A data in tag N by the A data in tag(N+1). In S59 the CPU 71 calculates a second product X2 by multiplyingthe A data in tag (N+1) by the A data in tag (N+2), In S61 the CPU 71determines whether the first product X1 is equivalent to the B data intag (N+1) and the second product X2 is equivalent to the C data in tag(N+1).

Here, the expression “the first product X1 is equivalent to the B datain tag (N+1)” means that at least part of a sequence of digits formingthe first product X1 are respectively identical to at least part of theB data in tag (N+1), and the expression “the second product X2 isequivalent to the C data in tag (N+1)” means that at least part of asequence of digits forming the second product X2 are respectivelyidentical to at least part of the C data in tag (N+1). Morespecifically, in S71 the CPU 71 determines that the first product X1 isequivalent to the B data in tag (N+1) when the last four digits of thefirst product X1 fully match the B data in tag (N+1), and determinesthat the second product X2 is equivalent to the C data in tag (N+1) whenthe last four digits if the second product X2 fully match the C data intag (N+1).

When the CPU 71 determines that the first product X1 is equivalent tothe B data in tag (N+1) and the second product X2 is equivalent to the Cdata in tag (N+1) (S61: YES), in S63 the CPU 71 sets the writepermission flag for tag (N+1) to “1” in the flash memory 75. However, ifthe first product X1 is not equivalent to the B data in tag (N+1) or ifthe second product X2 is not equivalent to the C data in tag (N+1) (S61:NO), in S65 the CPU 71 sets the write permission flag for tag (N+1) to“0” in the flash memory 75. After completing step S63 or S65, the CPU 71returns to S51. Each time the above process in 555 through S65 isexecuted, a write permission flag is stored in the flash memory 75 forthe wireless communication tag 80 read just prior to the latest tag N,i.e., the wireless communication tag 80 as tag (N+1).

If tag information 140 does not exist for both tag (N+1) and tag (N+2)(S55: NO), in S83 the CPU 71 determines whether the tag information fora tag (N+1) exists. If the tag information 140 for a tag (N+1) exists(S83: YES), the tag (N+1) whose tag information 140 was last read isconsidered the wireless communication tag 80 provided on the leading endof the tape 50. Therefore, in S85 the CPU 71 determines whether the Cdata in tag (N+1) is “0”. Specifically, the CPU 71 determines whether a“0” is stored in the address C area 204 of the tag information 140stored in the flash memory 75 for tag (N+1). If the C data for tag (N+1)is “0” (S85: YES), in S87 the CPU 71 calculates the first product X1 asdescribed in S57. In other words, the CPU 71 calculates the firstproduct X1 by multiplying the A data in tag N and A data in tag (N+1).

In S89 the CPU 71 determines whether the first product X1 is equivalentto the B data in tag (N+1). If the first product X1 is equivalent to theB data of tag (N+1) (S89: YES), tag (N+1) is considered to be a validwireless communication tag 80. In S91 the CPU 71 sets the writepermission flag for tag (N+1) to “1” in the flash memory 75. However, ifthe C data in tag (N+1) is not “0” (S85: NO) or if the first product X1is not equivalent to the B data in tag (N+1) (S89: NO), ta.g (N+1) maynot be a valid wireless communication tag 80. Thus, in S93 the CPU 71sets the write permission flag for tag (N+1) to “0” in the flash memory75. After completing step S91 or S93, or if the tag information 140 fora tag (N+1) does not exist (S83: NO), the CPU 71 returns to S51.

On the other hand, if a wireless communication tag 80 cannot berecognized (S51: NO), in S71 the CPU 71 determines whether the taginformation 140 for a tag N exists, If the tag information 140 for a tagN exists (S71: YES), the tag N whose tag information 140 was last readis considered the wireless communication tag 80 provided on the trailingend of the tape 50. Therefore, in S73 the CPU 71 determines whether theB data in tag N is “0”. Specifically, the CPU 71 determines whether a“0” is stored in the address B area 203 of the tag information 140stored in the flash memory 75 for tag N. If the B data for tag N is “0”(573: YES), in S75 the CPU 71 calculates the first product X1 asdescribed in S57. In other words, the CPU 71 calculates the firstproduct X1 by multiplying the A data in tag N and A data in tag (N+1).

In S77 the CPU 71 determines whether the first product X1 is equivalentto the C data in tag N. If the first product X1 is equivalent to the Cdata of tag N (S77: YES), tag N is considered to be a valid wirelesscommunication tag 80. In S79 the CPU 71 sets the write permission flagfor tag N to “1” in the flash memory 75. However, if the B data in tag Nis not “0” (S73: NO) or if the first product X1 is not equivalent to theC data in tag N (S77: NO), tag N may not be a valid wirelesscommunication tag 80. Thus, in S81 the CPU 71 sets the write pelcnissionflag for tag N to “0” in the flash memory 75. After completing step S79or S81, or if the tag information 140 for a tag N does not exist (S71:NO), the CPU 71 ends the tag confirmation process.

Next, a specific example of the read/write control process according tothe fifth embodiment will be described with reference to FIGS. 4A and13. In this example, the wireless communication reader 16 sequentiallyreads the tag information 140A through 140C from the labels 51A through51C (the wireless communication tags 80A through 80C) while the tape 50is being conveyed in a printing operation. At the tuning after the taginformation 14013 was read, the variable N stored in the flash memory 75is “99” (s51: YES, S53).

In this case, the tag information 140A is stored (S55: NO, S83: YES),and the value “101840” is calculated as the first product X1 in S87 bymultiplying the A data “2546” in the tag information 140A by the A data“40” in the tag information 140B. Since the last four digits of thefirst product X1 are equivalent to the B data “1840” in the taginformation 140A (S89: YES), in S91 the CPU 71 sets the write permissionflag for the wireless communication tag 80A to “1”. Thereafter, targetinformation is written to the wireless communication tag 80A, asdescribed in the first embodiment.

At the timing after the tag information 1400 was read, the variable Nstored in the flash memory 75 is “98” (S51: YES, S53).

In this case, the value “301360” is calculated as the first product X1in S57 by multiplying the A data “40” in the tag information 140B by theA data “7534” in the tag information 140C. The value “101840” iscalculated as the second product X2 in S59 by multiplying the A data“40” in the tag information 140B by the A data “2546” in the taginformation 140A. Since the last four digits of the first product X1 areequivalent to the B data “1360” in the tag information 140B and the lastfour digits of the second product X2 are equivalent to the C data “1840”in the tag information 140B (S61: YES), in S63 the CPU 71 sets the writepermission flag for the wireless communication tag 80B to “1”.Thereafter, target information is written to the wireless communicationtag 80B, as described in the first embodiment.

REFERENCE

The printing device 1 according to the embodiments described above isprovided with the tape feed motor 23, thermal head 10, wirelesscommunication reader 16, wireless communication writer 18, and CPU 71.The tape feed motor 23 feeds the tape 50 along its longitudinaldirection. The tape 50 has a plurality of labels 51 arranged along itslongitudinal direction. Each label 51 is provided with a wirelesscommunication tag 80 that stores at least authentication data (A data, Bdata, and C data, for example). The thermal head 10 prints on the labels51 of the tape 50 fed by the tape feed motor 23. The wirelesscommunication reader 16 reads information. from the wirelesscommunication tags 80 provided in the labels 51 of the tape 50.

The CPU 71 controls the wireless communication reader 16 to read firstauthentication data and second authentication data (S3 of FIGS. 5, 8,and 10, S33 of FIG. 12, S53 of FIG. 14). The first authentication datais stored in the wireless communication tag 80 provided on a firstlabel, and the second authentication data is stored in the wirelesscommunication tag 80 provided on a second label. The CPU 71 determineswhether the first authentication data and second authentication dataread by the wireless communication reader 16 satisfy an authenticationcondition (S7 of FIG. 5, S17 of FIG. 8, S27 of FIG. 10, S37 of FIG. 12,S61 of FIG. 14). The authentication condition is a predeterminedrelationship between the first authentication data and secondauthentication data.

Through this process, the printing device 1 determines whether thewireless communication tag 80 of the first label is valid using thefirst authentication data in the wireless communication tag 80 of thefirst label and the second authentication data in the wirelesscommunication tag 80 of the second label. In other words, the printingdevice 1 can reliably determine whether the wireless communication tag80 of a first label is valid through authentication using not just thewireless communication tag 80 on the first label, but authenticationusing wireless communication tags 80 on two labels (the first label andthe second label). Thus, the printing device 1 can suppress unauthorizedwriting of information to wireless communication tags 80 provided on thetape 50.

The wireless communication writer 18 writes information to wirelesscommunication tags 80 provided on labels 51 on the tape 50 fed by thetape feed motor 23. The CPU 71 permits the writing of information by thewireless communication writer 18 to the first label when determiningthat the authentication condition has been met (S9 of FIGS. 5, 8, and10, S39 of FIG. 12, S63 of FIG. 14). In this way, the printing device 1can suppress unauthorized writing of information to a wirelesscommunication tag 80 that is not valid.

The second label is adjacent to the first label in the longitudinaldirection of the tape 50. Accordingly, by performing authenticationusing wireless communication tags 80 on two neighboring labels (thefirst label and second label), the printing device 1 can quicklydetermine whether the wireless communication tag 80 on the first labelis valid.

In the first embodiment, the CPU 71 determines that the authenticationcondition has been met when the first authentication data (B data in tag(N−1)) and second authentication data (A data in tag N) read by thewireless communication reader 16 are the same data (S7 of FIG. 5).

In the second embodiment, the CPU 71 determines that the authenticationcondition has been met when a calculated value is equivalent to aprescribed key value (S17 of FIG. 8). The calculated value is found byapplying the first authentication data (B data in tag (N−1)) and secondauthentication data (A data in tag N) read by the wireless communicationreader 16 to a prescribed formula (an addition expression).Specifically, the CPU 71 determines whether the calculated value is akey value using a key value (prescribed value) pre-stored in the ROM 72of the printing device 1 (S17).

In the third embodiment, the CPU 71 determines that the authenticationcondition has been met when a calculated value is equivalent to aprescribed key value (S17 of FIG. 10). Here, the calculated value isfound by applying the first authentication data (A data in tag (N−1))and second authentication data (A data in tag N) read by the wirelesscommunication reader 16 to a prescribed formula (a multiplicationexpression). In S3 the CPU 71 controls the wireless communication reader16 to read the key value stored in the wireless communication tag 80provided on the first label (B data in tag (N−1)). In S27 the CPU 71determines whether the calculated value is the key value using the keyvalue read in S3.

In the fourth embodiment, the CPU 71 determines that the authenticationcondition has been met when a calculated value is equivalent to aprescribed key value (S37 of FIG. 12). Here, the calculated value isfound by applying the first authentication data (A data in tag (N+1))and second authentication data (A data in tag N) read by the wirelesscommunication reader 16 to a prescribed formula (a multiplicationexpression). In S33 the CPU 71 controls the wireless communicationreader 16 to read the key value stored in the wireless communication tag80 provided on the first label (B data in tag (N+1)). In S37 the CPU 71determines whether the calculated value is the key value using the keyvalue read in S35.

In the fifth embodiment, in S53 of FIG. 14, the CPU 71 controls thewireless communication reader 16 to read first authentication data (Adata in tag (N+1), second authentication data (A data in tag N), andthird authentication data (A data in tag N+2). The third authenticationdata is data stored in the wireless communication tag 80 provided on thethird label that neighbors the first label in the longitudinal directionof the tape 50 on the side opposite the second label. In S61 the CPU 71determines whether the first authentication data and secondauthentication data read by the wireless communication reader 16 satisfya first authentication condition and whether the first authenticationdata and third authentication data read by the wireless communicationreader 16 satisfy a second authentication condition. When both the firstauthentication condition and second authentication condition are met, inS63 the CPU 71 allows writing of information by the wirelesscommunication writer 18 to the first label.

For example, the CPU 71 determines that the first authenticationcondition is met when a first calculated value (the first product X1) isequivalent to a prescribed first key value (S57, S61). The firstcalculated value is found by applying the first authentication data andsecond authentication data read by the wireless communication reader 16to a prescribed formula (a multiplication expression). The CPU 71determines that the second authentication condition is met when a secondcalculated value (the second product X2) is equivalent to a prescribedsecond key value (S57, S61). The second calculated value is found byapplying the first authentication data and third authentication dataread by the wireless communication reader 16 to a prescribed formula (amultiplication expression).

For example, in S53 of FIG. 14, the CPU 71 controls the wirelesscommunication reader 16 to read a first key value stored in the wirelesscommunication tag 80 provided on the first label (B data in tag (N+1)).In S61 the CPU 71 determines whether the first calculated value is thefirst key value using the first key value read in S53. Also in S53 theCPU 71 controls the wireless communication reader 16 to read a secondkey value stored in the wireless communication tag 80 provided on thefirst label (C data. in tag (N+1)). In S61 the CPU 71 determines whetherthe second calculated value is the second key value using the second keyvalue read in S53.

In the embodiments described above, the wireless communication tags 80are examples of the storage element of the present disclosure. The tapefeed motor 23 is an example of the supply portion of the presentdisclosure. The thermal head 10 is an example of the printing portion ofthe present disclosure. The wireless communication reader 16 is anexample of the reading portion of the present disclosure. The wirelesscommunication writer 18 is an example of the writing portion of thepresent disclosure. The CPU 71 is an example of the controller of thepresent disclosure. The ROM 52 is an example of the memory of thepresent disclosure. While the description has been made in detail withreference to specific embodiments, it would be apparent to those skilledin the art that various changes and modifications may be made thereto.

For example, any combination of the first through fifth embodiments maybe implemented. The wireless communication tags 80 may also be storageelements using a wireless communication system different from RFID tags.The wireless communication reader 16 and wireless communication writer18 may be a reader and writer that employ a wireless communicationsystem different from RFID tags. The above-described embodimentsdescribe a case in which one wireless communication tag 80 is providedon each label 51, but a plurality of wireless communication tags 80 maybe provided on a single label 51. The labels 51 are also not limited tofixed-length labels, but may be variable in length.

In the first and second embodiments described above, the combinations ofA data and B data stored in the plurality of wireless communication tags80 are praferably all different from each other. In this case, the CPU71 may determine in combination with the determinations in step S7 ofFIG. 5 and step S17 of FIG. 8 whether A data hi tag (N−1) differs fromthe A data in tag N. If the A data in tag (N−1) is the same as the Adata in tag N, the wireless communication tag 80 may be invalid.Accordingly, in S11 the CPU 71 may set the write permission flag for tag(N−1) stored in the flash memory 75 to “0”.

In the third through fifth embodiments described above, theauthentication data “0” functions as an end marker or a start marker.All other authentication data is preferably set to values other than“0”. Therefore, in the third through fifth embodiments described above,the four digits to the right of the decimal for seconds in themanufacturing time, which are not realistically likely to be “0”, areset as the A data, which is the basis for calculating all authenticationdata, Note that if the four digits to the right of the decimal place inseconds in the manufacturing time happen to be “0000”, the A data may beset to a value obtained by adding a prescribed value (“1”, for example)to this value.

In S109 of the tag writing process (see FIG. 6), the above-describedembodiments describe a case in which A data and B data are modified byadding a prescribed value to each of the A data and B data. However, theprescribed value that is added to the A data and B data in S109 isarbitrary, provided that the A data and B data are modified. Further,the A data and B data may be modified through an arithmetic operationother than addition. Note that when a special value (“0” in theabove-described embodiments) has a function such as an end marker or astart marker, the A data and B data are preferably modified in S109through an arithmetic operation that does not change the A data and Bdata to the special value.

What is claimed is:
 1. A printing device comprising: a supply portionconfigured to convey a tape in a longitudinal direction thereof, thetape including: a plurality of labels arranged continuously in thelongitudinal direction, the plurality of labels including a first labeland a second label; and a plurality of storage elements provided onrespective ones of the plurality of labels, each of the plurality ofstorage elements being configured to store at least authentication data,the plurality of storage elements including a first storage elementprovided on the first label and a second storage element provided on thesecond label, the first storage element being configured to store firstauthentication data, the second storage element being configured tostore second authentication data; a printing portion configured to printon the plurality of labels; a reading portion configured to read theauthentication data from each of the plurality of storage elements; anda controller configured to perform: (a) reading the first authenticationdata from the first storage element and the second authentication datafrom the second storage element by the reading portion; and (b)determining whether the first authentication data is correlated to thesecond authentication data to meet an authentication condition.
 2. Theprinting device according to claim 1, further comprising: a writingportion configured to write information to each of the plurality ofstorage elements, wherein the controller is configured to furtherperform: (c) permitting, in response to determining that theauthentication condition is met, the writing portion to writeinformation to the first storage element.
 3. The printing deviceaccording to claim 1, wherein the second label neighbors the first labelin the longitudinal direction.
 4. The printing device according to claim1, wherein in the (b) determining, the authentication condition requiresthat the first authentication data be equivalent to the secondauthentication data.
 5. The printing device according to claim 1,wherein the (b) determining comprises: (b1) calculating anauthentication value by applying the first authentication data and thesecond authentication data to a prescribed formula; and (b2) determiningwhether the authentication value is equivalent to a prescribed keyvalue.
 6. The printing device according to claim 5, further comprising:a memory configured to store the prescribed key value in advance,wherein the (b2) determining determines whether the authentication valueis equivalent to the prescribed key value stored in the memory.
 7. Theprinting device according to claim 5, wherein the (b) determiningfurther comprises: (b3) reading the prescribed key value stored in thefirst storage element by the reading portion, and wherein the (b2)determining determines whether the authentication value is equivalent tothe prescribed key read from the first storage element.
 8. The printingdevice according to claim 2, wherein the plurality of labels furtherincludes a third label neighboring the first label on an opposite sideof the second label in the longitudinal direction, and the plurality ofstorage elements includes a third storage element provided on the thirdlabel and configured to store third authentication data, wherein the (a)reading further reads the third authentication data from the thirdstorage element by the reading portion, wherein the (b) determiningdetermines whether the first authentication data is correlated to thesecond authentication data to meet a first authentication condition andis correlated to the third authentication data to meet a secondauthentication condition, and wherein the (c) permitting permits thewriting portion to write information to the first storage element inresponse to determining that both the first authentication condition andthe second authentication condition are met.
 9. The printing deviceaccording to claim 8, wherein the (b) determining comprises: (b4)calculating a first authentication value by applying the firstauthentication data and the second authentication data to a firstformula; (b5) determining whether the first authentication value isequivalentto a first key value; (b6) calculating a second authenticationvalue by applying the first authentication data and the thirdauthentication data to a second formula; and (b7) determining whetherthe second authentication value is equivalent to a second key value. 10.The printing device according to claim 9, wherein the (b) determiningfurther comprises: (b8) reading the first key value and the second keyvalue stored in the first storage element by the reading portion, andwherein the (b5) determining determines whether the first authenticationvalue is equivalent to the first key value read from the first storageelement, and the (b7) determining determines whether the secondauthentication value is equivalent to the second key value read from thefirst storage element.
 11. A tape comprising: a plurality of labelsarranged continuously in a longitudinal direction, the plurality oflabels including a first label and a second label neighboring the firstlabel in the longitudinal direction; and a plurality of storage elementsprovided on respective ones of the plurality of labels, each of theplurality of storage elements being provided with a first storage areaand a second storage area, the first storage area being configured tostore first data in advance, the second storage area being configured tostore second data in advance, the plurality of storage elementsincluding a first storage element provided on the first label and asecond storage element provided on the second label, wherein the seconddata stored in the first storage element is equivalent to the first datastored in the second storage element.
 12. The tape according to claim11, wherein the plurality of labels further includes a third labelneighboring the first label on an opposite side of the second label inthe longitudinal direction, and the plurality of storage elementsincludes a third storage element provided on the third label, andwherein the first data stored in the first storage element is equivalentto the second data stored in the third storage element.
 13. A tapecomprising: a plurality of labels arranged continuously in alongitudinal direction, the plurality of labels including a first label,a second label, and a third label, the second label neighboring thefirst label in the longitudinal direction, the third label neighboringthe first label on an opposite side of the second label in thelongitudinal direction; and a plurality of storage elements provided onrespective ones of the plurality of labels, each of the plurality ofstorage elements being provided with a first storage area and a secondstorage area, the first storage area being configured to store firstdata in advance, the second storage area being configured to storesecond data in advance, the plurality of storage elements including afirst storage element, a second storage element, and a third storageelement, the first storage element being provided on the first label,the second storage element being provided on the second label, the thirdstorage element being provided on the third label, wherein a firstsequence of digits forms a first total value of the second data storedin the first storage element and the first data stored in the secondstorage element, and a second sequence of digits forms a second totalvalue of the first data stored in the first storage element and thesecond data stored in the third storage element, at least part of thefirst sequence of digits being identical to at least part of the secondsequence of digits.
 14. A tape comprising: a plurality of labelsarranged continuously in a longitudinal direction, the plurality oflabels including a first label and a second label neighboring the firstlabel in the longitudinal direction; and a plurality of storage elementsprovided on respective ones of the plurality of labels, each of theplurality of storage elements being provided with a first storage areaand a second storage area, the first storage area being configured tostore authentication data in advance, the second storage area beingconfigured to store a first key value in advance, the plurality ofstorage elements including a first storage element provided on the firstlabel and a second storage element provided on the second label, whereina first sequence of digits forms a first authentication value obtainedby multiplying the authentication data stored in the first storageelement and the authentication data stored in the second storageelement, and a second sequence of digits forms the first key valuestored in the second storage element, at least part of the firstsequence of digits including at least part of the second sequence ofdigits.
 15. The tape according to claim 14, Wherein the plurality oflabels further includes a third label neighboring the first label on anopposite side of the second label in the longitudinal direction, and theplurality of storage elements includes a third storage element providedon the third label, wherein each of the plurality of storage elements isprovided with a third storage area configured to store a second keyvalue in advance, and wherein a third sequence of digits forms a secondauthentication value obtained by multiplying the authentication datastored in the first storage element and the authentication data storedin the third storage element, and a fourth sequence of digits forms thesecond key value stored in the third storage element, at least part ofthe third sequence of digits including at least part of the fourthsequence of digits.