SEAMLESS RFID TAG SECURITY SYSTEM
First Claim
Patent Images
1. A Radio Frequency Identification (RFID) security system, comprising:
- a client that includes a computerized system;
at least one RFID tag;
a RFID reader;
wherein;
said computerized system and said RFID reader employ a first security protocol to communicate;
said RFID reader and said RFID tag employ a second security protocol to communicate;
said first security protocol and said second security protocol enable use of at least one member of the set consisting of encryption and authentication, thereby providing security for communications within the RFID security system; and
said first security protocol and said second security protocol both use at least one member of the set consisting of same key exchange algorithms, same encryption algorithms, and related keys, thereby providing seamless communications within the RFID security system.
4 Assignments
0 Petitions
Accused Products
Abstract
A Radio Frequency Identification (RFID) security system having a client, that includes a computerized system, at least one RFID tag, and a RFID reader. The computerized system and RFID reader employ a first security protocol and the RFID reader and RFID tags employ a second security protocol for communications. The security protocols permit encryption and/or authentication, and use either the same key exchange algorithms, the same encryption algorithms, and/or related keys to provide seamless communications within the RFID security system.
97 Citations
15 Claims
-
1. A Radio Frequency Identification (RFID) security system, comprising:
-
a client that includes a computerized system;
at least one RFID tag;
a RFID reader;
wherein;
said computerized system and said RFID reader employ a first security protocol to communicate;
said RFID reader and said RFID tag employ a second security protocol to communicate;
said first security protocol and said second security protocol enable use of at least one member of the set consisting of encryption and authentication, thereby providing security for communications within the RFID security system; and
said first security protocol and said second security protocol both use at least one member of the set consisting of same key exchange algorithms, same encryption algorithms, and related keys, thereby providing seamless communications within the RFID security system. - View Dependent Claims (2, 3, 4)
-
-
5. A method for providing secured communications in a Radio Frequency Identification (RFID) system, between a computerized system and at least one RFID tag, via a RFID reader, the method comprising:
-
(a) establishing a network link between the computerized system and the RFID reader, wherein said network link employs a first security protocol;
(b) establishing a radio frequency (RF) link between the RFID reader and the RFID tag, wherein said RF link employs a second security protocol, the first security protocol and the second security protocol both using at least one member of a first set consisting of same key exchange algorithms, same encryption algorithms, and related keys; and
(c) communicating, between the computerized system and the RFID tag, at least one member of a second set consisting of commands for the RFID tag from the computerized system, data for the RFID tag from the computerized system, and data for the computerized system from the RFID tag, using the first security protocol and the second security protocol. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
-
12. A Radio Frequency Identification (RFID) security system, comprising:
-
a computerized processing means to process communications within said RFID security system;
at least one RFID tag means for performing at least one member of a first set consisting of receiving and performing a command, receiving and employing an instance of received data, and transmitting an instance of transmitted data;
RFID reader means for engaging in client communications with said computerized processing means with respect to at least one member of said first set;
said RFID reader means further for engaging in tag communications with said at least one RFID tag means with respect to at least one member of said first set;
said computerized processing means and said RFID reader means employing a first security protocol for said client communications;
said RFID reader means and said RFID tag means employing a second security protocol for said tag communications; and
wherein, said first security protocol and said second security protocol permit at least one member of the set consisting of encryption and authentication; and
wherein, said first security protocol and said second security protocol both use at least one member of the set consisting of same key exchange algorithms, same encryption algorithms, and related keys, thereby providing seamless communications within the RFID security system. - View Dependent Claims (13, 14, 15)
-
Specification