×

Method, transponder, and system for secure data exchange

  • US 20080061941A1
  • Filed: 06/25/2007
  • Published: 03/13/2008
  • Est. Priority Date: 06/23/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for secure data exchange between a base station and a transponder that is a passive and/or backscatter-based transponder, whereby an access password of the transponder is subdivided into a first identification and a second identification, which are transmitted successively during transmission of the access password by the base station to the transponder, and the first identification and the second identification and/or a test value, assigned to the second identification, are stored in a nonvolatile memory of the transponder, the method comprising:

  • providing a first code by the transponder, which is transmitted to the base station upon an associated request from the base station;

    generating a first encoded transmission information, which includes the first identification, by the base station based on the first code, and which is transmitted to the transponder;

    providing a second code by the transponder, which is transmitted to the base station upon an associated request from the base station; and

    generating a second encoded transmission information, which includes the second identification of the base station based on the second code and transmitted to the transponder;

    wherein a base station code is generated by the base station, wherein the first encoded transmission information is generated by the base station by encoding the base station code with the first identification and the first code, wherein the base station code is extracted by the transponder with acceptance of a correct transmission of the first identification, wherein the second code is encoded with the extracted base station code before transmission to the base station and transmitted encoded to the base station, wherein the second identification is extracted by the transponder from the second encoded transmission information and verified, and wherein at least one memory region of the transponder is released for read and/or write access or permanently blocked after the second identification is verified as valid.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×