USING PROMISCUOUS AND NON-PROMISCUOUS DATA TO VERIFY CARD AND READER IDENTITY
First Claim
Patent Images
1. An access control system, comprising:
- (a) one or more radio frequency identification (RFID) devices, each RFID device including a memory comprising promiscuous and non-promiscuous regions, (i) said promiscuous region including data comprising at least one of manufacturer data, configuration data and general non-secure data;
(ii) said non-promiscuous region including at least one of manufacturer data, configuration data, shared-secret data and holder data;
(b) one or more radio frequency (RF) interrogators (readers), said readers transmitting an RF signal to create an active RF zone around said readers; and
wherein, when an RFID device is positioned in an active zone of a reader, data stored in the promiscuous region is first transmitted from the RFID device to the reader, and data from the non-promiscuous region is selectively transmitted to the reader only upon a request initiated by the reader.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for authenticating radio frequency identification (RFID) devices and validating readers of the RFID devices are disclosed. Embodiments of the invention use RFID devices adapted for storing data in a form of data segments selectively associated with promiscuous and non-promiscuous regions of their memories and monitor algorithmic, computational, communicational, or tampered errors of the readers
63 Citations
28 Claims
-
1. An access control system, comprising:
-
(a) one or more radio frequency identification (RFID) devices, each RFID device including a memory comprising promiscuous and non-promiscuous regions, (i) said promiscuous region including data comprising at least one of manufacturer data, configuration data and general non-secure data;
(ii) said non-promiscuous region including at least one of manufacturer data, configuration data, shared-secret data and holder data;
(b) one or more radio frequency (RF) interrogators (readers), said readers transmitting an RF signal to create an active RF zone around said readers; and
wherein, when an RFID device is positioned in an active zone of a reader, data stored in the promiscuous region is first transmitted from the RFID device to the reader, and data from the non-promiscuous region is selectively transmitted to the reader only upon a request initiated by the reader. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for validating components in an access control system, comprising:
-
(a) providing one or more radio frequency identification (RFID) devices, said RFID devices including a memory comprising promiscuous and non-promiscuous regions, and at least one radio frequency (RF) interrogator (reader), wherein said promiscuous region includes data comprising at least one of manufacturer data, configuration data and general non-secure data and said non-promiscuous region includes data comprising at least one of configuration data, shared-secret data and holder data;
(b) said at least one reader transmitting an RF signal to create an active RF zone around said at least one reader;
(c) positioning at least one RFID device into said active zone;
(d) in response positioning said at least one RFID device into said active zone, detecting data stored in said promiscuous region of said at least one RFID device;
(e) determining contents of said detected data correspond to at least one of said manufacturer data, configuration data, and general non-secure data; and
(f) requesting at least one portion of data from the non-promiscuous region of the RFID device. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A radio frequency identification (RFID) device, comprising:
-
an antenna for communicating with a radio frequency (RF) enabled device;
a memory comprising;
a promiscuous region comprising at least one of manufacturer data, configuration data, and general non-secure data; and
a non-promiscuous region comprising at least one of manufacturer data, configuration data, shared-secret data, and holder data; and
wherein data stored in the promiscuous region is freely transmitted from said RFID to an RF enabled device upon presentation of said RFID to said RF enabled device, and wherein data from said non-promiscuous region is selectively transmitted to an RF enabled device only upon a request initiated by said RF enabled device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification