Encryption of radio frequency identification tags
First Claim
Patent Images
1. A method of encrypting identification tags of the type having a data storage for storing a fixed tag UID unique to each of said tags and variable user data, said tag UID and said user data being readable by a tag reader, said method comprising the steps of:
- providing an identification tag having a permanent UID stored thereon;
providing an encryption engine operative for encrypting user data with an encryption key;
entering said UID to provide part or all of said encryption key;
entering user data for encryption by said engine;
encrypting said user data with said encryption key to derive encrypted user data; and
storing said encrypted user data in said data storage of said identification tag.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for encrypting and decrypting user data stored on identification tags, such as RFID tags, of the type having a tag identification code unique to each tag. An encryption/decryption key unique to each tag is based in part or in whole on the tag identification code of each tag, and the unique key is used to encrypt data for storage on the corresponding tag and to decrypt encrypted user data stored on the tag.
-
Citations
16 Claims
-
1. A method of encrypting identification tags of the type having a data storage for storing a fixed tag UID unique to each of said tags and variable user data, said tag UID and said user data being readable by a tag reader, said method comprising the steps of:
-
providing an identification tag having a permanent UID stored thereon;
providing an encryption engine operative for encrypting user data with an encryption key;
entering said UID to provide part or all of said encryption key;
entering user data for encryption by said engine;
encrypting said user data with said encryption key to derive encrypted user data; and
storing said encrypted user data in said data storage of said identification tag. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of decrypting encrypted user data stored on an encrypted identification tag, comprising the steps of:
-
providing a decryption engine operative for decrypting said encrypted user data with an encryption key;
presenting an encrypted identification tag for reading;
reading said tag UID and said encrypted user data stored on said encrypted identification tag;
providing said tag UID to said decryption engine for deriving said encryption key;
providing said encrypted user data to said decryption engine for decryption with said encryption key; and
decrypting said encrypted user data with said decryption engine to derive decrypted user data. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
- 15. A method for encrypting and decrypting user data stored on identification tags of the type having a UID code on each tag, comprising the steps of generating a key based in part or in whole on said UID code of one said tag, encrypting said user data with said key to derive encrypted user data for storage on said one tag, and decrypting encrypted user data read from said one tag with said key, such that a unique key is generated for encryption and decryption of user data on each tag.
Specification