Transponder, method and reader for monitoring access to application data in the transponder

作者: Mario Steiner

DOI:

关键词:

摘要: It is described a transponder (100), in particular RFID-tag, for wirelessly receiving external data (119) and monitoring access to application data, the comprising: storage (101) storing data; control region (105); controller (103) configured store, (105), indicative of an stored (101), when was accessed based on data. Further ,a method reader are described.

参考文章(43)
Ian Miller, David B. Everett, Keith M. Jackson, Tamper proof security measure in data writing to non-volatile memory ,(1994)
William Lynch, Michael L. Leonhardt, Jonathan P. Schnee, Leslie K. Hodge, Removable data storage media tracking system ,(2006)
Glen E. Graf, Christina L. Richards, Joseph Lesko, Richard A. Evans, John G. McDonald, Systems and methods for lossless compression of data and high speed manipulation thereof ,(2012)
Detlef Mueller, Dieter Hagedorn, Wolfgang Buhr, Circuit arrangement and method of detecting access violation in a microcontroller ,(2002)
Andreas Köpe, Florian Kohlmayer, Rainer Falk, Method for protecting product data from unauthorized access ,(2008)
Gary A. Lauden, Biometric identification system ,(2005)
Chun-Ming Ko, Jui-Chung Lee, Lan-Ben Wang, Ic package tray embedded rfid ,(2009)
Ulf Troppens, Craig A. Klein, Daniel J. Winarski, Josef Weingand, Nils Haustein, Apparatus and method to store information ,(2012)