Low Cost RFID Tag Security And Privacy System And Method
First Claim
Patent Images
1. A method for provisioning security for an RFID tag comprising:
- generating a random new tag ID;
generating a new master key based on an existing master key; and
generating encrypted user data to be placed on the tag utilizing the new tag ID as an IV and the new master key as input to an encryption algorithm; and
writing the new tag ID and the encrypted user data to the tag.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for provisioning security for an RFID tag. Initially, a random new tag ID is generated, and a new master key is generated based on an existing master key. Encrypted user data to be placed on the tag is generated utilizing the new tag ID as an IV and the new master key as input to an encryption algorithm. The new tag ID and the encrypted user data are then written to the tag.
-
Citations
14 Claims
-
1. A method for provisioning security for an RFID tag comprising:
-
generating a random new tag ID; generating a new master key based on an existing master key; and generating encrypted user data to be placed on the tag utilizing the new tag ID as an IV and the new master key as input to an encryption algorithm; and writing the new tag ID and the encrypted user data to the tag. - View Dependent Claims (2, 3, 4)
-
-
5. A method for provisioning security for an RFID tag comprising:
-
generating a random tag ID based on a known fixed-value tag ID; generating a new master key based on an existing master key; encrypting user data to be placed on the tag utilizing the tag ID as an IV and the new master key as input to an encryption algorithm; generating a keyed symmetric signature of the user data utilizing the tag ID as an IV, the new master key, and clear text user data as input to a keyed hashing algorithm; writing the tag ID, the encrypted user data, and the symmetric signature to appropriate parts of the tag; and generating one or more passwords based on the tag ID as an IV and the new master key as input to a keyed hashing algorithm; and locking data fields in the tag using the passwords. - View Dependent Claims (6, 7)
-
-
8. A method for enforcing security for an RFID tag having a tag ID and an associated master key used for provisioning the tag, the method comprising:
-
reading the tag ID from the tag; generating a keyed symmetric signature of the user data utilizing the tag ID as an IV, the master key, and clear text user data as input to a keyed hashing algorithm; decrypting the user data read off the tag utilizing the tag ID as an IV and the master key as input to an encryption algorithm; generating a keyed symmetric signature of the decrypted user data utilizing the tag ID as an IV, the master key, and clear text user data as input to a keyed hashing algorithm; reading the symmetric signature from the tag; and comparing the keyed symmetric signature to the symmetric signature read from the tag to determine validity of the tag. - View Dependent Claims (9, 10, 11)
-
-
12. A method for preventing tracking an RFID tag including a tag ID and an associated existing master key used for provisioning the tag, the method comprising:
-
reading the present tag ID from the tag; reading data fields, in the user data, from the tag including encrypted user data and an optional symmetric signature; generating a new tag ID for the tag; and re-provisioning the tag utilizing the new tag ID by; generating a new master key based on the existing master key; encrypting user data to be placed on the tag utilizing the new tag ID as an IV and the new master key as input to an encryption algorithm; and writing the new tag ID, the encrypted user data, and the optional symmetric signature to the tag.
-
-
13. A method for correlating a present tag ID, read from a protected RFID tag, with a previous tag ID owned by the same RFID tag comprising:
storing one or more of the previous tag IDs in encrypted form in memory of the tag on each rewrite operation performed on the tag. - View Dependent Claims (14)
Specification