摘要 |
<P>PROBLEM TO BE SOLVED: To provide a search system for an article using an IC tag, from which personal information is not unnecessarily leaked to the outside. <P>SOLUTION: The IC tag is installed in a store of a bicycle, and information (e.g. an ID number) specifying the bicycle is written in the IC tag by use of a reader/writer (S11). A management center registers data related to an owner of the bicycle into a database in addition to the information specifying the IC tag (S12). When the bicycle is stolen, the stolen bicycle is searched for by use of the reader/writer. At that time, the reader/writer records only the ID number of the bicycle, and searches for the bicycle. <P>COPYRIGHT: (C)2005,JPO&NCIPI |