METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING MUTUAL AUTHENTICATION FOR RADIO FREQUENCY IDENTIFICATION (RFID) SECURITY
First Claim
1. A method for providing mutual authentication for radio frequency identification (RFID) security, the method comprising:
- receiving an authentication request at a RFID tag from a requestor, the request including an encrypted access role;
transmitting an encrypted secret message to the requestor in response to receiving the authentication request, the encrypted secret message responsive to the encrypted access role;
receiving an access request at the RFID tag from the requestor, the access request generated by the requestor in response to the RFID tag being successfully authenticated by the requestor using the encrypted secret message, and the access request specifying a work area and including a random number that is encrypted;
authenticating the requester at the RFID tag including determining the value of the random number sent by the requestor and verifying that the work area is valid for the encrypted access role; and
responding to the access request using the value of the random number as an encryption key in response to the requestor being successfully authenticated at the RFID.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems and computer program products for providing mutual authentication for radio frequency identification (RFID) security. Methods include receiving an authentication request at a RFID tag from a requester, where the request includes an encrypted access role. An encrypted secret message is transmitted to the requestor in response to receiving the authentication request. The encrypted secret message is based on the encrypted access role received from the requester. An access request specifying a work area and including a random number that is encrypted is received from the requester at the RFID tag. The access request was generated by the requester in response to the RFID tag being successfully authenticated by the requestor using the encrypted secret message. The requester is authenticated at the RFID tag. The authenticating includes determining the value of the random number sent by the requester and verifying that the work area is valid for the encrypted access role. If the authenticating is successful, the RFID tag responds to the access request using the value of the random number as an encryption key.
39 Citations
20 Claims
-
1. A method for providing mutual authentication for radio frequency identification (RFID) security, the method comprising:
-
receiving an authentication request at a RFID tag from a requestor, the request including an encrypted access role; transmitting an encrypted secret message to the requestor in response to receiving the authentication request, the encrypted secret message responsive to the encrypted access role; receiving an access request at the RFID tag from the requestor, the access request generated by the requestor in response to the RFID tag being successfully authenticated by the requestor using the encrypted secret message, and the access request specifying a work area and including a random number that is encrypted; authenticating the requester at the RFID tag including determining the value of the random number sent by the requestor and verifying that the work area is valid for the encrypted access role; and responding to the access request using the value of the random number as an encryption key in response to the requestor being successfully authenticated at the RFID. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for providing a mutual authentication protocol for RFID networks, the system comprising an RFID tag including:
-
one or more secret messages; one or more work areas; one or more hash functions for encrypting data; and instructions to facilitate; receiving an authentication request at the RFID tag from a requester, the request including an encrypted access role; transmitting an encrypted secret message to the requester in response to receiving the authentication request, the encrypted secret message created by encrypting one of the secret messages corresponding to the encrypted access role; receiving an access request at the RFID tag from the requester, the access request generated by the requester in response to the RFID tag being successfully authenticated by the requestor using the encrypted secret message, and the access request specifying a work area and including a random number that is encrypted; authenticating the requestor at the RFID tag including determining the value of the random number sent by the requester and verifying that the work area is valid for the encrypted access role; and responding to the access request using the value of the random number as an encryption key in response to the requester being successfully authenticated at the RFID tag. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer program product for providing mutual authentication for RFID security, the computer program product comprising:
a storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for facilitating; receiving an authentication request at a RFID tag from a requester, the request including an encrypted access role; transmitting an encrypted secret message to the requestor in response to receiving the authentication request, the encrypted secret message responsive to the encrypted access role; receiving an access request at the RFID tag from the requester, the access request generated by the requester in response to the RFID tag being successfully authenticated by the requester using the encrypted secret message, and the access request specifying a work area and including a random number that is encrypted; authenticating the requester at the RFID tag including determining the value of the random number sent by the requester and verifying that the work area is valid for the encrypted access role; and responding to the access request using the value of the random number as an encryption key in response to the requestor being successfully authenticated at the RFID tag. - View Dependent Claims (17, 18, 19, 20)
Specification