USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.
-
Citations
30 Claims
-
1-10. -10. (canceled)
-
11. A method for identifying an authentication status of a first item through use of an algorithm configured to be executed within a first Radio Frequency Identifier (RFID) tag associated with the first item and configured to be executed within a second RFID tag associated with a second item that is a genuine representation of the first item, wherein the algorithm performs:
- receiving a first parameter as a first input and a second parameter as a second input;
forming a concatenation (C) of a parameter value, the second parameter, and a key value;
computing a hash (H) by applying a hashing function to the concatenation C; and
returning an identifier (Id) as a first output and the hash H as a second output, wherein the algorithm determines the parameter value to be the identifier Id if the first parameter is zero or to be the first parameter if the first parameter is not zero, wherein the method is performed by an apparatus comprising an RFID reader and a computer coupled to the RFID reader, and wherein the method comprises;said computer generating a random number (R); after said generating the random number R, said RFID reader transmitting zero (0) and the random number R from the RFID reader to the first RFID tag, wherein algorithm in the first RFID tag is configured to be executed using the transmitted zero and random number R as the first and second parameter, respectively, a first secret key stored in the first RFID tag as the key value, and an identifier Id1 of the first RFID tag stored in the first RFID tag as the identifier Id; after said transmitting zero and the random number R, said RFID reader receiving from the first RFID tag first data comprising the identifier Id1 and a hash (H1) consisting of the hash H computed by the algorithm as a result of the algorithm being executed in the first RFID tag; after said receiving the first data, said computer determining that the identifier Id1 in the first data is equal to an RFID identifier of the first item stored in a database; after determining that the identifier Id1 in the first data is equal to the RFID identifier, said RFID reader transmitting the identifier Id1 and the random number R to the second RFID tag, wherein algorithm in the second RFID is configured to be executed using the transmitted identifier Id1 and random number R as the first and second parameter, respectively, a second secret key stored in the second RFID tag as the key value, and an identifier Id2 of the second RFID tag stored in the second RFID tag as the identifier Id; after said transmitting the identifier Id1 and the random number R, said RFID reader receiving from the second RFID tag second data comprising the identifier ID2 and a hash (H2) consisting of the hash H computed by the algorithm as a result of the algorithm being executed in the second RFID tag; after said receiving the second data, said computer determining the authentication status of the first item by ascertaining whether H1 is equal to H2 and subsequently determining that the authentication status is that the first item is authentic or counterfeit if said ascertaining has ascertained that H1 is equal to H2 or that H1 is unequal to H2, respectively; said computer communicating the authentication status to a user. - View Dependent Claims (12, 13, 14, 15, 16, 17)
- receiving a first parameter as a first input and a second parameter as a second input;
-
18. A system comprising an apparatus, said apparatus comprising an RFID reader, a computer coupled to the RFID reader, and a computer readable storage medium comprising instructions that when implemented by the computer perform a being authentic or counterfeit through use of an algorithm configured to be executed within a first Radio Frequency Identifier (RFID) tag associated with the first item and configured to be executed within a second RFID tag associated with a second item that is a genuine representation of the first item, wherein the algorithm performs:
- receiving a first parameter as a first input and a second parameter as a second input;
forming a concatenation (C) of a parameter value, the second parameter, and a key value;
computing a hash (H) by applying a hashing function to the concatenation C; and
returning an identifier (Id) as a first output and the hash H as a second output, wherein the algorithm determines the parameter value to be the identifier Id if the first parameter is zero or to be the first parameter if the first parameter is not zero, and wherein the method comprises;said computer generating a random number (R); after said generating the random number R, said RFID reader transmitting zero (0) and the random number R from the RFID reader to the first RFID tag, wherein algorithm in the first RFID tag is configured to be executed using the transmitted zero and random number R as the first and second parameter, respectively, a first secret key stored in the first RFID tag as the key value, and an identifier Id1 of the first RFID tag stored in the first RFID tag as the identifier Id; after said transmitting zero and the random number R, said RFID reader receiving from the first RFID tag first data comprising the identifier Id1 and a hash (H1) consisting of the hash H computed by the algorithm as a result of the algorithm being executed in the first RFID tag; after said receiving the first data, said computer determining that the identifier Id1 in the first data is equal to an RFID identifier of the first item stored in a database; after determining that the identifier Id1 in the first data is equal to the RFID identifier, said RFID reader transmitting the identifier Id1 and the random number R to the second RFID tag, wherein algorithm in the second RFID is configured to be executed using the transmitted identifier Id1 and random number R as the first and second parameter, respectively, a second secret key stored in the second RFID tag as the key value, and an identifier Id2 of the second RFID tag stored in the second RFID tag as the identifier Id; after said transmitting the identifier Id1 and the random number R, said RFID reader receiving from the second RFID tag second data comprising the identifier ID2 and a hash (H2) consisting of the hash H computed by the algorithm as a result of the algorithm being executed in the second RFID tag; after said receiving the second data, said computer determining the authentication status of the first item by ascertaining whether H1 is equal to H2 and subsequently determining that the authentication status is that the first item is authentic or counterfeit if said ascertaining has ascertained that H1 is equal to H2 or that H1 is unequal to H2, respectively; said computer communicating the authentication status to a user. - View Dependent Claims (19, 20, 21, 22, 23, 24)
- receiving a first parameter as a first input and a second parameter as a second input;
-
25. A computer readable storage medium comprising instructions that when implemented by a computer perform a method for identifying an authentication status of a first item through use of an algorithm configured to be executed within a first Radio Frequency Identifier (RFID) tag associated with the first item and configured to be executed within a second RFID tag associated with a second item that is a genuine representation of the first item, wherein the algorithm performs:
- receiving a first parameter as a first input and a second parameter as a second input;
forming a concatenation (C) of a parameter value, the second parameter, and a key value;
computing a hash (H) by applying a hashing function to the concatenation C; and
returning an identifier (Id) as a first output and the hash H as a second output, wherein the algorithm determines the parameter value to be the identifier Id if the first parameter is zero or to be the first parameter if the first parameter is not zero, wherein an apparatus comprises an RFID reader and the computer coupled to the RFID reader, and wherein the method comprises;said computer generating a random number (R); after said generating the random number R, said RFID reader transmitting zero (0) and the random number R from the RFID reader to the first RFID tag, wherein algorithm in the first RFID tag is configured to be executed using the transmitted zero and random number R as the first and second parameter, respectively, a first secret key stored in the first RFID tag as the key value, and an identifier Id1 of the first RFID tag stored in the first RFID tag as the identifier Id; after said transmitting zero and the random number R, said RFID reader receiving from the first RFID tag first data comprising the identifier Id1 and a hash (H1) consisting of the hash H computed by the algorithm as a result of the algorithm being executed in the first RFID tag; after said receiving the first data, said computer determining that the identifier Id1 in the first data is equal to an RFID identifier of the first item stored in a database; after determining that the identifier Id1 in the first data is equal to the RFID identifier, said RFID reader transmitting the identifier Id1 and the random number R to the second RFID tag, wherein algorithm in the second RFID is configured to be executed using the transmitted identifier Id1 and random number R as the first and second parameter, respectively, a second secret key stored in the second RFID tag as the key value, and an identifier Id2 of the second RFID tag stored in the second RFID tag as the identifier Id; after said transmitting the identifier Id1 and the random number R, said RFID reader receiving from the second RFID tag second data comprising the identifier ID2 and a hash (H2) consisting of the hash H computed by the algorithm as a result of the algorithm being executed in the second RFID tag; after said receiving the second data, said computer determining the authentication status of the first item by ascertaining whether H1 is equal to H2 and subsequently determining that the authentication status is that the first item is authentic or counterfeit if said ascertaining has ascertained that H1 is equal to H2 or that H1 is unequal to H2, respectively; said computer communicating the authentication status to a user. - View Dependent Claims (26, 27, 28, 29, 30)
- receiving a first parameter as a first input and a second parameter as a second input;
Specification