Method for securing information between RFID reader and tag, and RFID reader and tag using the same
First Claim
1. A method for securing information between a Radio Frequency Identification (RFID) reader and an RFID tag, comprising the steps of:
- a) requesting an access password of the RFID tag in the RFID reader;
b) extracting a key value mapped to the access password transmitted from the RFID tag and transmitting the key value to the RFID tag in the RFID reader;
c) outputting a hash function value from the key value transmitted from the RFID reader in the RFID tag; and
d) determining whether to allow the RFID reader to access to an RFID tag memory based on whether the outputted hash function value is the same as the access password of the RFID tag.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided is a method for securing information between a Radio Frequency Identification (RFID) reader and tag, and an RFID Reader and tag using the same. The method includes the steps of: a) requesting an access password of the RFID tag in the RFID reader; b) extracting a key value mapped to the access password transmitted from the RFID tag and transmitting the key value to the RFID tag in the RFID reader; c) outputting a hash function value from the key value transmitted from the RFID reader in the RFID tag; and d) determining whether to allow the RFID reader to access to an RFID tag memory based on whether the outputted hash function value is the same as the access password of the RFID tag.
-
Citations
15 Claims
-
1. A method for securing information between a Radio Frequency Identification (RFID) reader and an RFID tag, comprising the steps of:
-
a) requesting an access password of the RFID tag in the RFID reader;
b) extracting a key value mapped to the access password transmitted from the RFID tag and transmitting the key value to the RFID tag in the RFID reader;
c) outputting a hash function value from the key value transmitted from the RFID reader in the RFID tag; and
d) determining whether to allow the RFID reader to access to an RFID tag memory based on whether the outputted hash function value is the same as the access password of the RFID tag. - View Dependent Claims (2, 3, 4)
-
-
5. A method for protecting information of a Radio Frequency Identification (RFID) tag, comprising the steps of:
-
a) creating a random key value;
b) calculating a hash function value from the random key value and transmitting the hash function value to the RFID tag;
c) storing the random key value and the hash function value in the RFID reader; and
d) storing the hash function value transmitted from the RFID reader as an access password of the RFID tag and converting a status of the RFID tag into a lock status. - View Dependent Claims (6, 7)
-
-
8. A Radio Frequency Identification (RFID) reader, comprising:
-
a control means for creating a message for requesting an access password of an RFID tag; and
a memory for storing the access password and a key value corresponding to the access password, wherein the RFID reader extracts the key value corresponding to the access password transmitted from the RFID tag in the memory and transmitting the extracted key value to the RFID tag. - View Dependent Claims (9, 10, 11)
-
-
12. A Radio Frequency Identification (RFID) tag, comprising:
-
a memory for storing an access password of the RFID tag; and
a signal processing means for outputting a hash function value from a key value transmitted from the RFID reader and allowing memory access when the outputted hash function value is the same as the stored access password. - View Dependent Claims (13, 14, 15)
-
Specification