RFID protocols with non-interacting variants
First Claim
Patent Images
1. A method for operating an RFID reader, the method comprising:
- transmitting to a tag, a query command from a reader that is configured to store a first pair of keys including a first key and a second key, wherein the tag is configured to store a second pair of keys including a third key and a fourth key, and wherein the first pair of keys and the second pair of keys are used to create a sub-selection of a population of readers and tags;
transmitting to the tag, the first key from the reader;
receiving a first value from the tag if the first key from the reader matches the third key stored in the tag;
encrypting the first value using the second key stored in the reader to obtain a second value;
transmitting the second value to the tag that is configured to decrypt the second value using the fourth key to derive a challenge value;
receiving an identifier from the tag if a comparison of the first value to the challenge value indicates that the first value matches the challenge value.
0 Assignments
0 Petitions
Accused Products
Abstract
In an RFID system having at least one tag and at least one reader, a tag and a reader can, in one embodiment, use a pair of keys, known to both the tag and the reader, to restrict the interaction of the tag and the reader so that tags having the pair of keys interact only with readers that use the pair of keys.
27 Citations
18 Claims
-
1. A method for operating an RFID reader, the method comprising:
-
transmitting to a tag, a query command from a reader that is configured to store a first pair of keys including a first key and a second key, wherein the tag is configured to store a second pair of keys including a third key and a fourth key, and wherein the first pair of keys and the second pair of keys are used to create a sub-selection of a population of readers and tags; transmitting to the tag, the first key from the reader; receiving a first value from the tag if the first key from the reader matches the third key stored in the tag; encrypting the first value using the second key stored in the reader to obtain a second value; transmitting the second value to the tag that is configured to decrypt the second value using the fourth key to derive a challenge value; receiving an identifier from the tag if a comparison of the first value to the challenge value indicates that the first value matches the challenge value. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A machine readable non-transitory storage medium which contains executable instructions which when executed by a reader cause the reader to perform a method for operating an RFID reader, the method comprising:
-
transmitting to a tag, a query command from the reader that is configured to store a first pair of keys including a first key and a second key, wherein the tag is configured to store a second pair of keys including a third key and a fourth key, and wherein the first pair of keys and the second pair of keys are used to create a sub-selection of a population of readers and tags; transmitting to the tag, the first key from the reader; receiving a first value from the tag if the first key from the reader matches the third key stored in the tag; encrypting the first value using the second key stored in the reader to obtain a second value; transmitting the second value to the tag that is configured to decrypt the second value using the fourth key to derive a challenge value; receiving an identifier from the tag if a comparison of the first value to the challenge value indicates that the first value matches the challenge value. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A reader, comprising:
-
a memory; a transmitter and a receiver; a processor coupled to the memory and to the transmitter and to the receiver, wherein the transmitter is configured to transmit a query command from the reader that is configured to store a first pair of keys including a first key and a second key, wherein the transmitter is configured to transmit the first key to a tag that is configured to store a second pair of keys including a third key and a fourth key, wherein the first pair of keys and the second pair of keys are used to create a sub-selection of a population of readers and tags, wherein the receiver is configured to receive a first value from the tag if the first key from the reader matches the third key stored in the tag, wherein the transmitter is configured to encrypt the first value using the second key stored in the reader to obtain a second value;
wherein the transmitter is configured to transmit the second value to the tag that is configured to decrypt the second value using the fourth key to derive a challenge value; andwherein the receiver is configured to receive an identifier from the tag if a comparison of the first value to the challenge value indicates that the first value matches the challenge value. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification