Methods and Apparatuses to Secure Data Transmission in RFID Systems Against Eavesdropping
First Claim
Patent Images
1. A method implemented in a radio frequency identification (RFID) system, the method comprising:
- communicating random information between an RFID reader and an RFID tag during the RFID reader interrogating the RFID tag;
generating an encryption key using previously shared information and the random information; and
communicating a message between the RFID reader and the RFID tag via encryption based on the key during the RFID reader interrogating the RFID tag.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses to secure data transmission in a radio frequency identification (RFID) system and other Vernam-cipher based cryptography methods against eavesdropping. In one embodiment, a method implemented in an RFID system includes generating an encryption key using previously shared information and random information received in a current communication session and securing a communication in the current session using the encryption key.
-
Citations
31 Claims
-
1. A method implemented in a radio frequency identification (RFID) system, the method comprising:
-
communicating random information between an RFID reader and an RFID tag during the RFID reader interrogating the RFID tag; generating an encryption key using previously shared information and the random information; and communicating a message between the RFID reader and the RFID tag via encryption based on the key during the RFID reader interrogating the RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A radio frequency identification (RFID) system, comprising:
-
an RFID tag; and an RFID reader, the tag to transmit random information to the reader in response to the reader interrogating the tag, the tag and the reader to generate an encryption key using a shared secret and the random information and to communicate a message via encryption based on the key. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A radio frequency identification (RFID) tag, comprising:
-
an antenna; a transceiver coupled to the antenna; a memory to store a number; and a controller coupled to the memory and transceiver, the controller including a random number generator and a key generator; wherein, in response to a request received via the antenna and the transceiver, the random number generator is to generate a random number for transmission by the transceiver as a response to the request, and the key generator to generate an encryption key using the random number and the number stored in the memory. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A radio frequency identification (RFID) reader, comprising:
-
a transceiver coupled to an antenna; a memory to store a number; and a processor coupled to the memory and transceiver to transmit a request signal to an RFID tag for a random number; wherein responsive to the transceiver receiving the random number from the RFID tag, the processor is to generate an encryption key using the random number and the number stored in the memory. - View Dependent Claims (24, 25)
-
-
26. A machine readable media embodying instructions, the instructions causing a radio frequency identification (RFID) reader to perform a method, the method comprising:
-
communicating random information over a communication channel; generating an encryption key using previously shared information and the random information; and communicating over the communication channel a message via encryption based on the key.
-
-
27. A method implemented in a data communication system, the method comprising:
-
communicating random information over a communication channel; generating an encryption key using previously shared information and the random information; and communicating over the communication channel a message via encryption based on the key. - View Dependent Claims (28, 29, 30, 31)
-
Specification