Challenged-based tag authentication medel
First Claim
1. A method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information, the method comprising:
- sending, from the reader, a message to the tag;
the tag, in response to the message, generating a challenge value and sending the challenge value to the reader;
in any order;
the reader performing a mathematical operation on the challenge value based upon a key value to generate a challenge reply and sending the challenge reply to the tag; and
the tag independently computing a challenge response based on the key value and mathematical operation;
the tag comparing the challenge response computed by the tag with the challenge reply send by the reader; and
the tag authenticating the reader if the challenge response matches the challenge reply.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information comprises sending, from the reader, a message to the tag; the tag, in response to the message, generating a challenge value and sending the challenge value to the reader; in any order: the reader performing a mathematical operation on the challenge value based upon a key value to generate a challenge reply and sending the challenge reply to the tag and the tag independently computing a challenge response based on the key value and mathematical operation; the tag comparing the challenge response computed by the tag with the challenge reply sent by the reader; and the tag authenticating the reader if the challenge response matches the challenge reply. An RFID system including an RFID tag and a reader are configured to perform the above steps.
-
Citations
46 Claims
-
1. A method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information, the method comprising:
-
sending, from the reader, a message to the tag;
the tag, in response to the message, generating a challenge value and sending the challenge value to the reader;
in any order;
the reader performing a mathematical operation on the challenge value based upon a key value to generate a challenge reply and sending the challenge reply to the tag; and
the tag independently computing a challenge response based on the key value and mathematical operation;
the tag comparing the challenge response computed by the tag with the challenge reply send by the reader; and
the tag authenticating the reader if the challenge response matches the challenge reply. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information, the method comprising:
-
sending, from the tag, a message to the reader;
the reader, in response to the message, generating a challenge value and sending the challenge value to the tag;
in any order;
the tag performing a mathematical operation on the challenge value based upon a key value to generate a challenge reply and sending the challenge reply to the reader; and
the reader independently computing a challenge response based on the key value and mathematical operation;
the reader comparing the challenge response computed by the reader with the challenge reply sent by the tag; and
the reader authenticating the tag if the challenge response matches the challenge reply. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An RFID communications system comprising:
-
an RF tag having a memory configured to store information; and
a reader configured to send a message to the tag;
the tag being configured to, in response to the message, generate a challenge value and send the challenge value to the reader;
the reader being configured to perform a mathematical operation on the challenge value based upon a key value to generate a challenge reply and send the challenge reply to the tag;
the tag being further configured to independently compute a challenge response based on the key value and mathematical operation, to compare the challenge response computed by the tag with the challenge reply sent by the reader, and to authenticate the reader if the challenge response matches the challenge reply. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. An RFID communications system comprising:
-
an RF tag having a memory configured to store information; and
a reader configured for RF communication with the tag, the tag being configured to send a message to the reader;
the reader being configured to, in response to the message, generate a challenge value and send the challenge value to the tag;
the tag being configured to perform a mathematical operation on the challenge value based upon a key value to generate a challenge reply and send the challenge reply to the reader;
the reader being further configured to independently compute a challenge response based on the key value and mathematical operation, to compare the challenge response computed by the reader with the challenge reply sent by the tag, and to authenticate the tag if the challenge response matches the challenge reply. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. A method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information, the method comprising the following steps, in order:
-
sending, from the tag, a message to the reader;
the reader, in response to the message, generating a challenge value, independently computing a challenge response based on the key value and mathematical operation, and sending the challenge value to the tag;
the tag performing a mathematical operation on the challenge value based upon a key value to generate a challenge reply and sending the challenge reply to the reader;
the reader directly comparing the challenge response computed by the reader with the challenge reply sent by the tag, without first performing a mathematical operation on the challenge reply; and
the reader authenticating the tag if the challenge response matches the challenge reply. - View Dependent Claims (30, 31, 32, 33, 34, 35, 37, 38, 39, 40, 41, 42, 43)
-
-
36. An RFID reader for use with an RF tag having a memory configured to store information and configured to send an authentication request to the reader, the reader being configured to, in response to the request:
-
generate a challenge value and send the challenge value to the tag, and wait for the tag to perform a mathematical operation on the challenge value based upon a key value to generate a challenge reply and to send the challenge reply to the reader;
independently compute a challenge response based on the key value and mathematical operation prior to receiving the challenge reply from the tag;
compare the challenge response computed by the reader with the challenge reply sent by the tag without performing a mathematical operation on the challenge reply sent by the tag prior to the comparing; and
authenticate the tag if the challenge response matches the challenge reply.
-
-
44. A method of securing communications in an RFID system including a reader and an RF tag, the method comprising the following steps:
-
sending, from the reader, a request to the tag;
the tag, in response to the request, generating and sending a challenge value to the reader;
the reader performing a mathematical operation on the challenge value using a reader private key value to generate an encrypted challenge reply and sending the encrypted challenge reply to the tag;
the tag performing a mathematical operation on the encrypted challenge reply using a reader public key value to generate a decrypted response;
the tag comparing the decrypted response with the challenge value; and
the tag authenticating the reader if the decrypted response matches the challenge value.
-
-
45. A method of securing communications in an RFID system including a reader and an RF tag, the method comprising the following steps:
-
the reader generating a non-encrypted challenge value;
the reader sending a request, including the challenge value, to the tag;
the tag, in response to the request, performing a mathematical operation on the challenge value using a tag private key value to generate an encrypted challenge reply and sending the encrypted challenge reply to the reader;
the reader performing a mathematical operation on the encrypted challenge reply using a tag public key value to generate a decrypted response;
the reader comparing the decrypted response with the challenge value; and
the reader authenticating the tag if the decrypted response matches the challenge value.
-
-
46. A method of securing communications in an RFID system including a reader and an RF tag, the method comprising the following steps:
-
the reader generating a non-encrypted first challenge value;
the reader sending a request, including the first challenge value, to the tag;
the tag, in response to the request, performing a mathematical operation on the first challenge value using a tag private key value to generate an encrypted first challenge reply;
the tag generating a non-encrypted second challenge value, and sending the first challenge reply and the second challenge value to the reader;
the reader performing a mathematical operation on the first challenge reply using a tag public key value to generate a decrypted first response;
the reader comparing the first response with the first challenge value and authenticating the tag if the first response matches the first challenge value;
the reader performing a mathematical operation on the second challenge value using a reader private key to generate an encrypted second challenge reply and sending the second challenge reply to the tag;
the tag performing a mathematical operation on the second challenge reply using a reader public key to generate a decrypted second response; and
the tag comparing the second response with the second challenge value and authenticating the reader if the second response matches the second challenge value.
-
Specification