Method, transponder, and system for secure data exchange
First Claim
1. A method for secure data exchange between a base station and a transponder that is a passive and/or backscatter-based transponder, whereby an access password of the transponder is subdivided into a first identification and a second identification, which are transmitted successively during transmission of the access password by the base station to the transponder, and the first identification and the second identification and/or a test value, assigned to the second identification, are stored in a nonvolatile memory of the transponder, the method comprising:
- providing a first code by the transponder, which is transmitted to the base station upon an associated request from the base station;
generating a first encoded transmission information, which includes the first identification, by the base station based on the first code, and which is transmitted to the transponder;
providing a second code by the transponder, which is transmitted to the base station upon an associated request from the base station; and
generating a second encoded transmission information, which includes the second identification of the base station based on the second code and transmitted to the transponder;
wherein a base station code is generated by the base station, wherein the first encoded transmission information is generated by the base station by encoding the base station code with the first identification and the first code, wherein the base station code is extracted by the transponder with acceptance of a correct transmission of the first identification, wherein the second code is encoded with the extracted base station code before transmission to the base station and transmitted encoded to the base station, wherein the second identification is extracted by the transponder from the second encoded transmission information and verified, and wherein at least one memory region of the transponder is released for read and/or write access or permanently blocked after the second identification is verified as valid.
11 Assignments
0 Petitions
Accused Products
Abstract
A method for data exchange is provided, whereby a first code is generated by a transponder, which is transmitted to a base station, a first transmission information is generated by the base station by encoding a base station code with a first identification and the first random number code, the first transmission information is transmitted to the transponder and the base station code is extracted by the transponder, a second code is generated by the transponder, which is transmitted to the base station upon an associated request from the base station, whereby before a transmission to the base station the second code is encoded with the extracted base station code, a second encoded transmission information comprising a second identification is generated by the base station with use of the second code and transmitted to the transponder, and at least one memory region of the transponder is released for read and/or write access after the second identification was verified as valid. The invention relates further to a transponder and to a system for secure data exchange.
61 Citations
14 Claims
-
1. A method for secure data exchange between a base station and a transponder that is a passive and/or backscatter-based transponder, whereby an access password of the transponder is subdivided into a first identification and a second identification, which are transmitted successively during transmission of the access password by the base station to the transponder, and the first identification and the second identification and/or a test value, assigned to the second identification, are stored in a nonvolatile memory of the transponder, the method comprising:
-
providing a first code by the transponder, which is transmitted to the base station upon an associated request from the base station;
generating a first encoded transmission information, which includes the first identification, by the base station based on the first code, and which is transmitted to the transponder;
providing a second code by the transponder, which is transmitted to the base station upon an associated request from the base station; and
generating a second encoded transmission information, which includes the second identification of the base station based on the second code and transmitted to the transponder;
wherein a base station code is generated by the base station, wherein the first encoded transmission information is generated by the base station by encoding the base station code with the first identification and the first code, wherein the base station code is extracted by the transponder with acceptance of a correct transmission of the first identification, wherein the second code is encoded with the extracted base station code before transmission to the base station and transmitted encoded to the base station, wherein the second identification is extracted by the transponder from the second encoded transmission information and verified, and wherein at least one memory region of the transponder is released for read and/or write access or permanently blocked after the second identification is verified as valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A transponder for secure data exchange with a base station, particularly a passive and/or backscatter-based transponder, wherein a first identification and a second identification and/or a test value, assigned to the second identification, are stored in a nonvolatile memory of the transponder and a first and a second code can be provided by the transponder,
wherein a base station code is extracted by the transponder from a received first encoded transmission information with knowledge of the first identification and of the first code, wherein the second code is encoded by the base station code for transmission by the transponder, wherein the second identification is extracted via the second code from a received second encoded transmission information and verified, and wherein at least one memory region of the transponder is released for read and/or write access or permanently blocked after the second identification is verified as valid.
-
14. A system for secure data exchange comprising:
-
a base station; and
a transponder, wherein;
a first code is provided in the transponder, which is transmitted to the base station upon an associated request by the base station, a base station code is generated by the base station, a first encoded transmission information is generated by the base station from the first identification, the base station code, and the first code, and is transmitted to the transponder, the base station code is extracted by the transponder via the first identification, a second code is provided in the transponder that is encrypted with the base station code and is transmitted to the base station, a second encoded transmission information is generated from the second identification and the second code by the base station and transmitted to the transponder, the second identification is extracted by the transponder from the second encoded transmission information and verified, and at least one memory region of the transponder is released for read and/or write access or permanently blocked after the second identification is verified as valid.
-
Specification