Production method, RFID transponder, authentication method, reader device and computer program product
First Claim
1. A method for producing an RFID transponder, the method comprising:
- providing the RFID transponder with a transponder-specific identifier;
providing the RFID transponder with a signature usable for authentication of the transponder; and
generating said signature by signing at least a part of the transponder-specific identifier, wherein said signature is stored in a hidden memory of the RFID transponder, the hidden memory is configured to only be accessible by dedicated commands and prevents customers from altering the signature stored in the hidden memory, and a private key used for the signing remains stored in a secured environment at a transponder-manufacturer site.
10 Assignments
0 Petitions
Accused Products
Abstract
The exemplary embodiments of the invention realize an efficient prevention of massive infiltration of cloned RFID transponders into existing and new RFID systems. Furthermore, reader devices used for authentication of RFID transponders do not need to be on-line and do not need to be equipped with a Security Authentication Module (SAM). This simplifies authentication procedures and reduces costs. According to an exemplary embodiment of the invention a transponder-specific originality signature is stored by a transponder manufacturer on the transponder. The transponder-specific originality signature may, for example, be stored in the non-volatile memory (EEPROM) of the transponder during the fabrication of the transponder. This transponder-specific originality signature can be checked at any time in a convenient way, which provides an indication of originality of said transponder.
6 Citations
11 Claims
-
1. A method for producing an RFID transponder, the method comprising:
-
providing the RFID transponder with a transponder-specific identifier; providing the RFID transponder with a signature usable for authentication of the transponder; and generating said signature by signing at least a part of the transponder-specific identifier, wherein said signature is stored in a hidden memory of the RFID transponder, the hidden memory is configured to only be accessible by dedicated commands and prevents customers from altering the signature stored in the hidden memory, and a private key used for the signing remains stored in a secured environment at a transponder-manufacturer site. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for authenticating an RFID transponder, wherein the authentication is performed by:
-
reading a transponder-specific identifier or a part of the transponder-specific identifier from the RFID transponder; reading a signature from the RFID transponder, said signature comprising the transponder-specific identifier or said part of the transponder-specific identifier in signed form and a private key used for the signing remains stored in a secured environment at a transponder-manufacturer site; and verifying the signature and determining that the RFID transponder is authentic only if the signature is valid, wherein said signature is read from a hidden memory from the RFID transponder by means of a dedicated command and the hidden memory is configured to only be accessible by dedicated commands and prevents customers from altering the signature stored in the hidden memory. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory medium comprising instructions which, when being executed by a processing unit, carry out or control respective steps of a method for authenticating an RFID transponder, the non-transitory medium comprising:
-
instructions for providing the RFID transponder with a transponder-specific identifier; instructions for providing the RFID transponder with a signature usable for authentication of the RFID transponder; and instructions for generating the signature by signing at least a part of the transponder-specific identifier, wherein the signature is stored in a hidden memory of the RFID transponder, the hidden memory is configured to only be accessible by dedicated commands and prevents customers from altering the signature stored in the hidden memory, and a private key used for the signing remains stored in a secured environment at a transponder-manufacturer site.
-
Specification