RFID MUTUAL AUTHENTICATION VERIFICATION SESSION
3 Assignments
0 Petitions
Accused Products
Abstract
In a protocol for preserving the privacy of communications between a RFID reader and a RFID tag, two distinct actions are taken. First, the reader and the tag must be mutually authenticated as being authorized participants in the communications. After that process is successfully completed, the authenticity of each authorized participant must be validated prior to each subsequent communication between reader and tag.
-
Citations
17 Claims
-
1-11. -11. (canceled)
-
12. A protocol for safeguarding the security of radio frequency identification (RFID) communications between a RFID authorized reader and a RFID tag having a memory with a read-protected portion so as to provide read protection for the read-protected portion of the tag memory against intrusion by an unauthorized reader, said protocol comprising
conducting a process of mutually authenticating said tag and said authorized reader as being authorized to participate in a series of transactions involving a readout of data from said read-protected portion of the tag'"'"'s memory; - and
separately verifying the authenticity of the reader as having said authority before each transaction in said series by determining whether the reader is authentic based on a comparison of a reader authentication code generated by the reader and a reader authentication code generated by the tag. - View Dependent Claims (13, 14, 15, 16, 17)
- and
Specification