RFID SECURITY SYSTEM
First Claim
Patent Images
1. A process for handling secret data, the process comprising:
- (a) writing a cryptography key in a data storage area in a radio-frequency identification (RFID) tag while said RFID tag is associated with a first holder;
(b) reading said cryptography key from said RFID tag while said RFID tag is associated with a second holder; and
(c) performing at least one of the steps of encrypting, decrypting, signing, signature verifying, and integrity checking the secret data, wherein the steps are performed based on said cryptography key.
4 Assignments
0 Petitions
Accused Products
Abstract
A process for handling secret data. In an RFID tag, a cryptography key protecting the secret data is written while with a first holder, a threshold cryptography share is stored, or an arbitrary value is obtained for an identity-based encryption (IBE) algorithm. The cryptography key can then be read and used by a second holder to access the secret data, the threshold cryptography shares can be read and aggregated with other shares to access the secret data, or the arbitrary value can be used as the basis for a public key to protect the secret data and with a corresponding private key to access the secret data.
111 Citations
25 Claims
-
1. A process for handling secret data, the process comprising:
-
(a) writing a cryptography key in a data storage area in a radio-frequency identification (RFID) tag while said RFID tag is associated with a first holder;
(b) reading said cryptography key from said RFID tag while said RFID tag is associated with a second holder; and
(c) performing at least one of the steps of encrypting, decrypting, signing, signature verifying, and integrity checking the secret data, wherein the steps are performed based on said cryptography key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A process for handling secret data, the process comprising:
-
(a) creating n shares of the secret data using a threshold cryptography algorithm such that only reconstruction of at least k of said shares reveals the secret data and wherein 1<
k≧
n; and
(b) storing at least one said share in a radio-frequency identification (RFID) tag. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A process for handling secret data, the process comprising:
-
(a) obtaining, in a radio-frequency identification (RFID) tag, an arbitrary value for an identity-based encryption (IBE) algorithm;
(b) reading said arbitrary value from said RFID tag; and
(c) determining a public key based on said arbitrary value, wherein said public key has a corresponding private key. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification