Contact-less tag with signature, and applications thereof
First Claim
1. A method, comprising:
- obtaining a signature from a contactlessly readable tag;
decrypting the signature with a key to obtain;
a candidate identifier, anda scrambling code associated with the signature; and
validating the candidate identifier based on at least one of the scrambling code and the signature.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, comprising: obtaining a signature from a contactlessly readable tag; decrypting the signature with a key to obtain (i) a candidate identifier and (ii) a scrambling code associated with the signature; and validating the candidate identifier based on at least one of the scrambling code and the signature. Also, a system, comprising: at least one tag reader configured to receive a plurality of signatures released by a respective plurality of tags, including a particular signature released by a particular one of the tags, and to cause decryption of the particular signature with a key to obtain (i) a candidate identifier, and (ii) a scrambling code associated with the signature; and a processing entity configured to effect validation of the candidate identifier based on at least one of the scrambling code and the signature.
58 Citations
50 Claims
-
1. A method, comprising:
-
obtaining a signature from a contactlessly readable tag; decrypting the signature with a key to obtain; a candidate identifier, and a scrambling code associated with the signature; and validating the candidate identifier based on at least one of the scrambling code and the signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer-readable medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method, the computer-readable program code comprising:
-
first computer-readable program code for causing the computing apparatus to obtain a signature from a tag; second computer-readable program code for causing the computing apparatus to decrypt the signature with a key to obtain; a candidate identifier, and a scrambling code associated with the signature; and third computer-readable program code for causing the computing apparatus to validate the candidate identifier based on at least one of the scrambling code and the signature.
-
-
27. A system, comprising:
-
at least one tag reader configured to receive a plurality of signatures released by a respective plurality of tags, including a particular signature released by a particular one of the tags, and to cause decryption of the particular signature with a key to obtain; a candidate identifier, and a scrambling code associated with the signature; and a processing entity configured to effect validation of the candidate identifier based on at least one of the scrambling code and the signature. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A system, comprising:
-
means for receiving a plurality of signatures released by a respective plurality of tags, including a particular signature released by a particular one of said tags; means for decrypting the particular signature with a key to obtain (I) a candidate identifier, and (II) a scrambling code associated with the signature; and means for validating the candidate identifier based on at least one of the scrambling code and the signature.
-
Specification