Radio frequency fingerprinting to detect fraudulent radio frequency identification tags
First Claim
Patent Images
1. A method of authenticating the identity of an RFID device comprising the steps of:
- providing an RFID device having a tag identifier stored therein;
recording the tag identifier for the RFID device along with an RF fingerprint for the RFID device;
interrogating an RFID device;
receiving a response from the interrogated RFID device;
determining an RF fingerprint for the received response; and
comparing the RF fingerprint associated with the received response to the RF fingerprint recorded with the tag identifier of the RFID device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authenticating the identity of an RFID device having a tag identifier stored therein. The tag identifier for the RFID device is recorded along with an RF fingerprint for the RFID device. When the RFID device is interrogated a response is received from the interrogated RFID device. An RF fingerprint is determined form the response and the received response including the RF fingerprint associated with the response is compared to an expected RF fingerprint previously known to be associated with the RFID device being interrogated.
-
Citations
17 Claims
-
1. A method of authenticating the identity of an RFID device comprising the steps of:
-
providing an RFID device having a tag identifier stored therein;
recording the tag identifier for the RFID device along with an RF fingerprint for the RFID device;
interrogating an RFID device;
receiving a response from the interrogated RFID device;
determining an RF fingerprint for the received response; and
comparing the RF fingerprint associated with the received response to the RF fingerprint recorded with the tag identifier of the RFID device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for authenticating RFID devices comprising:
-
a plurality of RFID devices, each having a tag identifier stored therein;
a data structure having a plurality of entries, wherein each entry is associated with a particular RFID device and holds the tag identifier for the associated RFID device along with an RF fingerprint for the associated RFID device;
a reader/interrogator operable to send an interrogation signal to the RFID devices, wherein at least one of the plurality of RFID devices is configured to generate a response signal in response to the interrogation signal;
a receiving component in the reader/interrogator operable to receive the response from one of the interrogated RFID devices;
a computational component in the reader/interrogator that is operable to determine an RF fingerprint for the received response; and
a lookup mechanism coupled to the data structure and operable to use information from the received response to retrieve an RF fingerprint associated with the RFID device; and
a comparator comparing the RF fingerprint associated with the received response to the RF fingerprint recorded with the tag identifier of the RFID device. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A data structure implemented in a physical memory device for use in an RFID authentication system, the data structure comprising:
-
a plurality of entries, wherein each entry is associated with a particular RFID device;
an identifier value stored in each entry, wherein the identifier is the same as an identifier stored in the associated RFID device; and
an RF fingerprint stored in each entry, wherein the RF fingerprint has been determined from RF characteristics of the associated RFID device. - View Dependent Claims (16, 17)
-
Specification