Secure RFID authentication system
First Claim
1. During item authentication—
- Cellular phone will use the public key distributed by Trusted Authority-giving the consumer the confidence that the Trusted Authority validates the product manufacturer.
0 Assignments
0 Petitions
Accused Products
Abstract
A system comprised of computer hardware and software used to authenticate collectable/valuable consumer products (FIG. 3 element 310) utilizing a cellular telephone (FIG. 3 element 330)—containing an RFID reader device—authenticated as a “Trusted Reader”. The “Trusted Reader” cellular telephone reads an RFID tag (FIG. 5 element 320) attached to and/or embedded within a product to acquire an RFID tag'"'"'s Electronic Product Code (EPC) (FIG. 5 element 322). The EPC unique id (and optionally other data) is transmitted over a Cellular Telephone Network (FIG. 5 element 340) to a Trust Authority (FIG. 3 element 370) to obtain an associated Public Key (FIG. 2 element 211) used in a cryptographic authentication challenge to authenticate an item against piracy and counterfeiting. The cellular telephone can transfer its data to a store Cash Register (FIG. 6 element 319) or Credit Card Reader to complete the purchase.
141 Citations
19 Claims
-
1. During item authentication—
- Cellular phone will use the public key distributed by Trusted Authority-giving the consumer the confidence that the Trusted Authority validates the product manufacturer.
-
2. Code signature of software codes added to Cellular phone to perform Authentication. Phone Image allowing Trusted Authority to authenticate Cell Phone.
-
3. Cell phone smart card or phone ID 150 is provided by the Cellular Phone company or by customer during registration process. This process provides automatic purchase registration by Trusted Authority.
-
4. Cell phone smart card or phone ID 150 is provided by Cellular Phone company or by customer during registration process. This process provides automatic purchase registration by Trusted Authority. Registration can occur automatically by having Cell phone owner call or network connect to Trusted Authority and having Cell phone provide the Smart Card/Phone ID data 150 to Trusted Authority. Data transfer can be performed using any standard data transfer method.
-
5. Trusted Authority will store identity of Cell Phone owner and link RFID information of purchased product to the owner of the Cell Phone.
-
6. Method to disable the linking of RFID for purchased product with Cell Phone Customer for privacy reasons.
-
7. Claim Manufacturer has optional Private/Public key pair with Trusted Authority, allowing Trusted Authority to authenticate the manufacturer.
-
8. Product Line private/public key pair allowing products RFID 320 to contain optional Product Line Public Key to allow product to authenticate the manufacturer using the Manufacturer'"'"'s Product Line public key embedded into RFID 320.
-
9. Trusted Authority can validate manufacturer information contained with RFID 320. Examples of information that Trusted Authority can verify include the registered public key for the products manufacturer and/or the manufacturer'"'"'s public key for the item.
-
10. Cellular Phone access and authentication protection into a network comprised of:
- Manufacturers, Credit Card Companies, Trusted Authorities, Banks, Distributors and Retailers.
-
11. Product embedded or attached RFID item level authentication to detect counterfeit, stolen, warranty voided products prior to purchase via cell phone enacted at a user'"'"'s discretion.
-
12. Utilize product authentication at on-line real-time auctions such as eBay to detect stolen merchandise prior to purchase.
-
13. Record a product'"'"'s RFID tag details prior to bid/purchase at an on-line real-time auction such as eBay.
-
14. Verify that a product'"'"'s RFID tag details recorded at time of bid/purchase at an on-line real-time auction such as eBay matches the RFID tag data at time of delivery.
-
15. Establish purchased product logs and statements in a secure cell phone network.
-
16. Distribute purchased item data to user specified entities.
-
17. Establish an ownership record to items purchased within the Secure RFID Authentication System.
-
18. Authenticate a user'"'"'s cell phone within the Secure RFID Authentication System.
-
19. Provide the means to establish a secure collection of desired products by storing the item'"'"'s RFID tag data into the authenticated cell phone.
Specification