Enhanced RFID tag authentication
First Claim
1. A method for a Radio Frequency Identification (RFID) system to cause an RFID integrated circuit (IC) having a first parameter to execute an action, the method comprising:
- sending a first command to the IC;
receiving from the IC at least an identifier and an encrypted version of the first parameter;
determining a key using the received identifier;
recovering the first parameter from the encrypted version using the key;
sending to the IC a single second command including at least a first portion of the first parameter; and
causing the IC to execute an action defined by at least the second command upon verifying at least the first portion of the first parameter.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication method includes RFID tags authenticating RFID readers. A tag sends a tag identifier and a reader challenge to a reader in response to one or more commands from the reader. The reader then either derives a response to the reader challenge itself or has a verification authority derive the response. The response may be derived from parameter(s) in the reader challenge, and may be derived using a cryptographic key. The reader then sends the response to the tag along with one or more commands. The tag verifies the response before executing action(s) associated with the command(s).
36 Citations
20 Claims
-
1. A method for a Radio Frequency Identification (RFID) system to cause an RFID integrated circuit (IC) having a first parameter to execute an action, the method comprising:
-
sending a first command to the IC; receiving from the IC at least an identifier and an encrypted version of the first parameter; determining a key using the received identifier; recovering the first parameter from the encrypted version using the key; sending to the IC a single second command including at least a first portion of the first parameter; and causing the IC to execute an action defined by at least the second command upon verifying at least the first portion of the first parameter. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for a Radio Frequency Identification (RFID) system to cause an RFID integrated circuit (IC) having a first parameter to execute an action, the method comprising:
-
sending a first command to the IC; receiving from the IC at least an identifier and an encrypted version of the first parameter; determining a key using the received identifier; recovering the first parameter from the encrypted version using the key; deriving a second parameter from the first parameter using a deriving operation that includes one of; setting the second parameter equal to the first parameter; incorporating the first parameter into a string; and computing an arithmetic function of at least the first parameter; sending to the IC a single second command including at least a first portion of the second parameter; and causing the IC to, upon verifying at least the first portion of the second parameter using the deriving operation and the first parameter, execute an action defined by at least the second command, wherein the first parameter and the second parameter do not define the action. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for a Radio Frequency Identification (RFID) system to cause an RFID integrated circuit (IC) having a first parameter to execute an action, the method comprising:
-
sending a first command to the IC; receiving from the IC at least an identifier and an encrypted version of the first parameter; determining a key using the received identifier; recovering the first parameter from the encrypted version using the key; deriving a second parameter from the first parameter; sending to the IC a single second command including at least a portion of the second parameter and defining at least part of an IC action; and causing the IC to, upon verifying at least the first portion of the second parameter using the deriving operation and the first parameter, execute the IC action, wherein the first parameter and the second parameter do not define the IC action. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification