RFID secure authentication
First Claim
Patent Images
1. A method of authenticating, the method comprising:
- encrypting a secret key stored on a first device with a unique identification code of the first device to generate an original authentication signature at the first device;
storing the original authentication signature in a memory associated with the first device;
reading the unique identification code from the memory using a second device;
encrypting a copy of the secret key stored on the second device with the unique identification code of the first device to generate a second authentication signature at the second device;
comparing the second authentication signature to the original authentication signature; and
determining authenticity of the first device based on a comparison of the second authentication signature and the original authentication signature.
1 Assignment
0 Petitions
Accused Products
Abstract
Authentication systems and methods for a population of devices each associated with an RFID tag are described. For each device, a secret key is combined cryptographically with a publicly-readable unique identifier (UID) of an RFID tag to obtain a unique authorization signature. The RFID tag is prepared utilizing the unique authorization signature as memory-access and/or tag-operation password(s). The systems and methods may safeguard against attacks whereby compromise of a single tag will not compromise the entire population of devices and may reduce or eliminate the use of inappropriate surgical devices during a surgical procedure.
70 Citations
12 Claims
-
1. A method of authenticating, the method comprising:
-
encrypting a secret key stored on a first device with a unique identification code of the first device to generate an original authentication signature at the first device; storing the original authentication signature in a memory associated with the first device; reading the unique identification code from the memory using a second device; encrypting a copy of the secret key stored on the second device with the unique identification code of the first device to generate a second authentication signature at the second device; comparing the second authentication signature to the original authentication signature; and determining authenticity of the first device based on a comparison of the second authentication signature and the original authentication signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for authenticating a surgical instrument, the system comprising:
-
a surgical instrument including; a first memory configured to store a unique identifier of the surgical instrument; and a password module configured to store a password; and an authentication unit, including; a communication module configured to communicate with the first memory; a second memory configured to store a secret key; a processor coupled to the second memory and the communication module, the processor configured to; read the unique identifier from the first memory; encrypt the secret key with the unique identifier to generate an authentication signature; transmit the authentication signature to the password module; and receive a verification status from the password module in response to the authentication signature matching the password. - View Dependent Claims (10, 11, 12)
-
Specification