Contact-less tag with signature, and applications thereof
First Claim
1. A method, comprising:
- assigning, by a centralized entity, a common key and an unencrypted common identifier for a plurality of tags;
generating, by the centralized entity, a plurality of scrambling codes for the plurality of tags;
generating, by the centralized entity, a plurality of signatures for the plurality of tag, comprising;
for each of the plurality of tags, encrypting the unencrypted common identifier and a corresponding scrambling code with the common key; and
loading the plurality of tags with the plurality of signatures, respectively,wherein the plurality of signatures appear scrambled relative to each other at a first time instance.
2 Assignments
0 Petitions
Accused Products
Abstract
A method which comprises generating a first signature by encoding an identifier with a first additional data set at a first time instant; responding to a first read request from a tag reader by releasing the first signature; generating a second signature by encoding the identifier with a second additional data set at a second time instant, the second additional data set being different from the first additional data set; and responding to a second read request by releasing the second signature. Also, a method which comprises obtaining a signature from a contactlessly readable tag; decrypting the signature with a key to obtain a candidate identifier and a scrambling code associated with the signature; and validating the candidate identifier based on at least one of the scrambling code and the signature.
-
Citations
17 Claims
-
1. A method, comprising:
-
assigning, by a centralized entity, a common key and an unencrypted common identifier for a plurality of tags; generating, by the centralized entity, a plurality of scrambling codes for the plurality of tags; generating, by the centralized entity, a plurality of signatures for the plurality of tag, comprising;
for each of the plurality of tags, encrypting the unencrypted common identifier and a corresponding scrambling code with the common key; andloading the plurality of tags with the plurality of signatures, respectively, wherein the plurality of signatures appear scrambled relative to each other at a first time instance. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer entity comprising:
-
circuitry configured to; assign a common key and an unencrypted common identifier for a plurality of tags; generate a plurality of scrambling codes for the plurality of tags; generate a plurality of signatures for the plurality of tag by, for each of the plurality of tags, encrypting the unencrypted common identifier and a corresponding scrambling code with the common key; and load the plurality of tags with the plurality of signatures, respectively, wherein the plurality of signatures appear scrambled relative to each other at a first time instance.
-
-
17. A non-transitory computer readable medium storing computer executable code that, when executed, causes a computer device to:
-
assign a common key and an unencrypted common identifier for a plurality of tags; generate a plurality of scrambling codes for the plurality of tags; generate a plurality of signatures for the plurality of tag by, for each of the plurality of tags, encrypting the unencrypted common identifier and a corresponding scrambling code with the common key; and load the plurality of tags with the plurality of signatures, respectively, wherein the plurality of signatures appear scrambled relative to each other at a first time instance.
-
Specification