Controlling deactivation of RFID tags
First Claim
1. A method executed by an RFID tag, comprising:
- comparing a trial string with a deactivation string, to determine whether the deactivation string and the trial string are the same, and if it is determined that the trial string and the deactivation string are the same, configuring the RFID tag to permit deactivation;
wherein an encrypted deactivation string is created externally to the RFID tag by encrypting the deactivation string, using a first key, and the trial string is created externally to the RFID tag by decrypting the encrypted deactivation string, using a second key.
1 Assignment
0 Petitions
Accused Products
Abstract
An RFID tag includes a transceiver for communicating with a tag reader; memory for storing a deactivation string, an encrypted deactivation string created externally to the tag by encrypting the deactivation string, and a trial string created externally to the tag by decrypting the encrypted deactivation; and logic for comparing the deactivation string and the trial string to determine whether they are the same, and, if they are the same, configuring the tag to permit deactivation. A method executed by the RFID tag includes comparing the trial string with the deactivation string to determine whether they are the same, and if they are the same, configuring the tag to permit deactivation. The trial string may be created externally to the tag by decrypting, using a first key, an encrypted deactivation string that is created externally to the tag by encrypting the deactivation string using a second key.
33 Citations
15 Claims
-
1. A method executed by an RFID tag, comprising:
- comparing a trial string with a deactivation string, to determine whether the deactivation string and the trial string are the same, and if it is determined that the trial string and the deactivation string are the same, configuring the RFID tag to permit deactivation;
wherein an encrypted deactivation string is created externally to the RFID tag by encrypting the deactivation string, using a first key, and the trial string is created externally to the RFID tag by decrypting the encrypted deactivation string, using a second key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
- comparing a trial string with a deactivation string, to determine whether the deactivation string and the trial string are the same, and if it is determined that the trial string and the deactivation string are the same, configuring the RFID tag to permit deactivation;
-
8. A method for controlling an RFID tag, comprising:
-
encrypting a deactivation string using a first key, to provide an encrypted deactivation string;
writing the deactivation string and the encrypted deactivation string into memory of an RFID tag;
reading the encrypted deactivation string from the RFID tag;
decrypting the encrypted deactivation string using a second key, to provide a trial string;
loading the trial string into memory of the RFID tag; and
by the RFID tag, comparing the trial string loaded into the RFID tag with the deactivation string written into the RFID tag to determine whether the trial string and the deactivation string are the same, and configuring the RFID tag to permit deactivation if the trial string and the deactivation string are determined to be the same. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An RFID tag, comprising:
-
a transceiver for communicating with an RFID tag reader;
memory for storing a deactivation string, for storing an encrypted deactivation string created externally to the RFID tag by encrypting the deactivation string, and for storing a trial string created externally to the RFID tag by reading the encrypted deactivation string from the memory, and decrypting the encrypted deactivation string to provide the trial string; and
logic for comparing the deactivation string and the trial string to determine whether the deactivation string and the trial string are the same, and, if the deactivation string and the trial string are determined to be the same, configuring the RFID tag to permit deactivation.
-
Specification