摘要 |
<P>PROBLEM TO BE SOLVED: To provide an IC tag authentication method, an IC tag authentication system, and a computer program preventing failure of the authentication system even when updating of information to an IC tag is carried out by a malicious third party. <P>SOLUTION: In the IC tag authentication method, writing and reading of information with respect to a plurality of IC tags is carried out, and authentication of whether or not a plurality of objects are present is carried out on the basis of information read from the plurality of IC tags attached to the plurality of objects. Group identification information and individual identification information are assigned to the plurality of tags attached to the plurality of objects, the assigned group identification information and the individual identification information is stored, the assigned identification information is written in each IC tag, the individual identification information is acquired from the plurality of IC tags attached to the plurality of objects, it is determined whether or not the acquired individual identification information matches with the individual identification information stored in association with the group identification information, and if it is determined that they do not match, information indicating the fact is outputted to the outside. <P>COPYRIGHT: (C)2006,JPO&NCIPI |