Contact-less tag with signature, and applications thereof
First Claim
1. A method, comprising:
- generating a first signature by encoding an identifier with a first additional data set at a first time instant;
responding to a first read request from a tag reader by releasing the first signature;
generating a second signature by encoding the identifier with a second additional data set at a second time instant, the second additional data set being different from the first additional data set; and
responding to a second read request by releasing the second signature.
1 Assignment
0 Petitions
Accused Products
Abstract
A method which comprises generating a first signature by encoding an identifier with a first additional data set at a first time instant; responding to a first read request from a tag reader by releasing the first signature; generating a second signature by encoding the identifier with a second additional data set at a second time instant, the second additional data set being different from the first additional data set; and responding to a second read request by releasing the second signature. Also, a method which comprises obtaining a signature from a contactlessly readable tag; decrypting the signature with a key to obtain a candidate identifier and a scrambling code associated with the signature; and validating the candidate identifier based on at least one of the scrambling code and the signature.
-
Citations
67 Claims
-
1. A method, comprising:
-
generating a first signature by encoding an identifier with a first additional data set at a first time instant; responding to a first read request from a tag reader by releasing the first signature; generating a second signature by encoding the identifier with a second additional data set at a second time instant, the second additional data set being different from the first additional data set; and responding to a second read request by releasing the second signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. Apparatus, comprising:
-
means for generating a first signature by encoding an identifier with an additional data set at a first time instant; means for responding to a first read request from a tag reader by releasing the first signature; means for generating a second signature by encoding the identifier with a second additional data set at a second time instant, the second additional data set being different from the first additional data set; and means for responding to a second read request from a tag reader by releasing the second signature.
-
-
24. A computer-readable medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method, the computer-readable program code comprising:
-
first computer-readable program code for causing the computing apparatus to generate a first signature by encoding an identifier with an additional data set at a first time instant; second computer-readable program code for causing the computing apparatus to respond to a first read request from a tag reader by releasing the first signature; third computer-readable program code for causing the computing apparatus to generate a second signature by encoding the identifier with a second additional data set at a second time instant, the second additional data set being different from the first additional data set; and fourth computer-readable program code for causing the computing apparatus to respond to a second read request from a tag reader by releasing the second signature.
-
-
25. A device for use in contact-less communication with a reader, comprising:
-
a memory configured to store a first signature generated by encoding an identifier with a first additional data set at a first time instant; and a controller configured to generate a new signature by encoding the identifier with a second additional data set at a second time instant, the second additional data set being different from the first additional data set; the controller further configured to cause the new signature to be stored in the memory after the second time instant. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. A device for use in contact-less communication with a reader, comprising:
-
a memory configured to store a signature that encodes a pre-determined identifier; a transceiver configured to contactlessly receive read requests from the reader and to contactlessly transmit responses thereto; a controller configured to respond to read requests received via the transceiver by releasing via the transceiver a current version of the signature stored in the memory, wherein the version of the signature stored in the memory varies over at least two time instants while continuing to encode the pre-determined identifier; and a power source for powering at least the controller. - View Dependent Claims (52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
Specification