Device and Method for Authenticating and Securing Transactions Using RF Communication
First Claim
1. A method operating on an RFID or NFC reader, comprising;
- requesting an encrypted token from an embedded system;
receiving the encrypted token from the embedded system;
transmitting the encrypted token to a network operation center;
receiving a plaintext token from the network operation center; and
, transmitting the plaintext token to the embedded system.
8 Assignments
0 Petitions
Accused Products
Abstract
A system is provided for authenticating and securing product transactions. An integrated circuit is attached to a target, such as an optical disc or electronic device. The integrated circuit has an RF transceiver that is capable of establishing communication with an associated reading device. The integrated circuit also has a hidden memory, which can not be read externally, and a user memory. The hidden memory stores an authentication message, while the user memory stores readable authentication information. The hidden authentication message and the authentication information are related through a cryptographic process. However, even though the integrated circuit benefits from the cryptographic security, the integrated circuit only operates relatively simple logic operations. In this way, a highly secure transaction is enabled without requiring significant processing power or time at the integrated circuit. When the integrated circuit is placed near the reader, the reader reads the authentication information, and with the cooperation of a network operation center, uses the authentication information to derive an activation code. The reader passes the activation code to the integrated circuit, which compares the activation code to its hidden activation message. If they have a proper relationship, the communication has been authenticated, and the integrated circuit proceeds to perform an action.
-
Citations
14 Claims
-
1. A method operating on an RFID or NFC reader, comprising;
-
requesting an encrypted token from an embedded system;
receiving the encrypted token from the embedded system;
transmitting the encrypted token to a network operation center;
receiving a plaintext token from the network operation center; and
,transmitting the plaintext token to the embedded system. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method operating on an RFID or NFC reader, comprising;
-
requesting a public key from an embedded system;
receiving the public key from the embedded system;
transmitting the public key to a network operation center;
receiving a authentication code from the network operation center; and
,transmitting the authentication code to the embedded system. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A method operating on an RFID or NFC reader, comprising;
-
requesting authentication information from an embedded system;
receiving the authentication information from the embedded system;
transmitting the authentication information to a network operation center;
receiving an authentication message from the network operation center; and
,transmitting the authentication message to the embedded system. - View Dependent Claims (14)
-
Specification