Radio frequency identification tag and radio frequency identification privacy protection system and method
First Claim
1. A radio frequency identification (RFID) privacy protection method applied to an RFID privacy protection system comprising an RFID tag and an RFID reader, the method comprising:
- receiving a pseudo identification (ID) used to authenticate the RFID reader and a key used to generate the pseudo ID;
if the pseudo ID is received in response to an information request signal for reading information of the RFID tag comprising the pseudo ID, transmitting the key to the RFID reader; and
if a pseudo ID generated using the key is equal to the pseudo ID received in response to the information request signal, receiving an RFID of the RFID tag to read the information of the RFID tag.
1 Assignment
0 Petitions
Accused Products
Abstract
A radio frequency identification (RFID,) tag, an RFID privacy protection system, and an RFID privacy protection method are provided. The RFID privacy protection method includes a pseudo identification (ID) used to authenticate the RFID reader and a key used to generate the pseudo ID are received; if the pseudo ID is received in response to an information request signal for reading information of the RFID tag comprising the pseudo ID, the key is transmitted; and if a pseudo ID generated using the key is equal to the pseudo ID received in response to the information request signal, an RFID of the RFID tag to read the information of the RFID tag is received.
108 Citations
8 Claims
-
1. A radio frequency identification (RFID) privacy protection method applied to an RFID privacy protection system comprising an RFID tag and an RFID reader, the method comprising:
-
receiving a pseudo identification (ID) used to authenticate the RFID reader and a key used to generate the pseudo ID;
if the pseudo ID is received in response to an information request signal for reading information of the RFID tag comprising the pseudo ID, transmitting the key to the RFID reader; and
if a pseudo ID generated using the key is equal to the pseudo ID received in response to the information request signal, receiving an RFID of the RFID tag to read the information of the RFID tag. - View Dependent Claims (2, 3)
-
-
4. A radio frequency identification (RFID) tag of an RFID privacy protection system comprising the RFID tag and an RFID reader, the system comprising:
-
a transceiver for receiving and transmitting a pseudo ID and a key;
a tag storage for storing the pseudo ID used to authenticate the RFID reader;
a determiner for determining whether the stored pseudo ID is equal to a pseudo ID generated using the received key, if a key corresponding to the pseudo ID transmitted in response to an information transmission request signal of the RFID reader is received; and
a tag controller for transmitting an RFID of the RFID tag through the transceiver, if the stored pseudo ID is equal to the generated pseudo ID. - View Dependent Claims (5)
-
-
6. A radio frequency identification (RFID) privacy protection system comprising an RFID tag and an RFID reader, the comprising:
-
a transceiver for receiving and transmitting a pseudo ID and a key;
an RFID interface for transmitting an information request signal for reading information of the RFID tag;
a storage for storing a pseudo ID received through the transceiver to be used to authenticate the RFID reader and a key used to generate the pseudo ID; and
a controller for transmitting the key through the RFID interface and receiving the RFID of the RFID tag, if the pseudo ID is received in response to the information request signal. - View Dependent Claims (7, 8)
-
Specification