Contact-less tag with signature, and applications thereof
First Claim
1. A method, comprising:
- receiving an encrypted signature from a tag associated with an item;
determining a dynamic parameter;
obtaining a key based at least in part on the dynamic parameter;
decrypting the signature with the key to obtain an identifier; and
performing an action related to identification of the item, based on the identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, comprising: receiving an encrypted signature from a tag associated with an item; determining a dynamic parameter; obtaining a key based at least in part on the dynamic parameter; decrypting the signature with the key to obtain an identifier; and performing an action related to identification of the item, based on the identifier. Also, a system, comprising: a tag reader configured to receive an encrypted signature from a tag associated with an item; and a processing entity configured to (i) determine a dynamic parameter; (ii) obtain a key based at least in part on the dynamic parameter; (iii) decrypt the signature with the key to obtain an identifier; and (iv) perform an action related to identification of the item, based on the identifier.
55 Citations
21 Claims
-
1. A method, comprising:
-
receiving an encrypted signature from a tag associated with an item; determining a dynamic parameter; obtaining a key based at least in part on the dynamic parameter; decrypting the signature with the key to obtain an identifier; and performing an action related to identification of the item, based on the identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method, the computer-readable program code comprising:
-
first computer-readable program code for causing the computing apparatus to be attentive to receipt of an encrypted signature from a tag associated with an item; second computer-readable program code for causing the computing apparatus to determine a dynamic parameter; third computer-readable program code for causing the computing apparatus to obtain a key based at least in part on the dynamic parameter; fourth computer-readable program code for causing the computing apparatus to decrypt the signature with the key to obtain an identifier; and fifth computer-readable program code for causing the computing apparatus to perform an action related to identification of the item, based on the identifier.
-
-
20. A system, comprising:
-
a tag reader configured to receive an encrypted signature from a tag associated with an item; and a processing entity configured to; determine a dynamic parameter; obtain a key based at least in part on the dynamic parameter; decrypt the signature with the key to obtain an identifier; and perform an action related to identification of the item, based on the identifier.
-
-
21. An apparatus, comprising:
-
means for receiving an encrypted signature from a tag associated with an item; means for determining a dynamic parameter; means for obtaining a key based at least in part on the dynamic parameter; means for decrypting the signature with the key to obtain an identifier; and means for performing an action related to identification of the item, based on the identifier.
-
Specification