Transponder, RFID system, and method for RFID system with key management
First Claim
1. A transponder for an RFID system, in particular a passive and/or backscatter-based transponder, comprising:
- a first memory area provided in the transponder for storing at least one first piece of information that is accessible in clear text only by a read access internal to the transponder; and
a second memory area for storing a second piece of information that is accessible in clear text through an air interface for read access,wherein the second piece of information is generated from the first piece of information using a public key of an asymmetric encryption method.
19 Assignments
0 Petitions
Accused Products
Abstract
A transponder is provided, in particular a passive and/or backscatter-based transponder, for an RFID system, wherein at least one first piece of information can be stored in a first memory area on the transponder that is accessible in clear text only by a read access internal to the transponder, and a second piece of information can be stored in a second memory area that is accessible in clear text through an air interface for read access, and the second piece of information is generated from the first piece of information using an asymmetric encryption method. The invention further relates to an RFID system for wireless data exchange comprising a transponder and a base station, and a method for requesting write and/or read access to a transponder, in particular a passive and/or backscatter-based transponder.
28 Citations
14 Claims
-
1. A transponder for an RFID system, in particular a passive and/or backscatter-based transponder, comprising:
-
a first memory area provided in the transponder for storing at least one first piece of information that is accessible in clear text only by a read access internal to the transponder; and a second memory area for storing a second piece of information that is accessible in clear text through an air interface for read access, wherein the second piece of information is generated from the first piece of information using a public key of an asymmetric encryption method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification