Method for Authenticating and Securing Transactions Using RF Communication
First Claim
1. A method operating on an embedded system, comprising;
- receiving a request for a stored encrypted token;
transmitting the stored encrypted token;
receiving a plaintext token;
comparing the received plaintext token to a stored plaintext token; and
, performing an action responsive to the comparison.
6 Assignments
0 Petitions
Accused Products
Abstract
A system is provided for authenticating and securing product transactions. An integrated circuit is attached to a target, such as an optical disc or electronic device. The integrated circuit has an RF transceiver that is capable of establishing communication with an associated reading device. The integrated circuit also has a hidden memory, which can not be read externally, and a user memory. The hidden memory stores an authentication message, while the user memory stores readable authentication information. The hidden authentication message and the authentication information are related through a cryptographic process. However, even though the integrated circuit benefits from the cryptographic security, the integrated circuit only operates relatively simple logic operations. In this way, a highly secure transaction is enabled without requiring significant processing power or time at the integrated circuit. When the integrated circuit is placed near the reader, the reader reads the authentication information, and with the cooperation of a network operation center, uses the authentication information to derive an activation code. The reader passes the activation code to the integrated circuit, which compares the activation code to its hidden activation message. If they have a proper relationship, the communication has been authenticated, and the integrated circuit proceeds to perform an action.
-
Citations
44 Claims
-
1. A method operating on an embedded system, comprising;
-
receiving a request for a stored encrypted token;
transmitting the stored encrypted token;
receiving a plaintext token;
comparing the received plaintext token to a stored plaintext token; and
,performing an action responsive to the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method operating on an embedded system, comprising:
-
receiving a plaintext token;
storing the plaintext token in a hidden memory location;
receiving an encrypted token; and
,storing the encrypted token in a user memory location. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method operating on an embedded system, comprising;
-
receiving a request for a stored public key;
transmitting the stored public key;
receiving an authentication code;
comparing the received authentication code to a stored authentication code; and
,performing an action responsive to the comparison. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
19. The method of claim 57, wherein the stored public key is related to the stored authentication code through a cryptographic algorithm.
-
29. A method operating on an embedded system, comprising:
-
receiving an authentication code;
storing the authentication code in a hidden memory location;
receiving a public key; and
,storing the public key in a user memory location. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. A method operating on an embedded system, comprising;
-
receiving a request for authentication information;
transmitting the authentication information;
receiving an authentication message;
comparing the received authentication message to a stored authentication message; and
,performing an action responsive to the comparison. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42)
-
-
43. A method operating on an embedded system, comprising:
-
receiving an authentication message;
storing the authentication message in a hidden memory location;
receiving authentication information; and
,storing the authentication information in a user memory location. - View Dependent Claims (44)
-
Specification