METHOD AND SYSTEM FOR AUTHENTICATING RFID TAG
First Claim
Patent Images
1. A method of authenticating an RFID (radio frequency identification) tag having a master key by an RFID reader, comprising:
- requesting the RFID tag to transmit a security parameter and receiving a security parameter response from the RFID tag, wherein the RFID tag generates a session key based on the master key and a first random number,;
transmitting a challenge to the RFID tag and receiving a challenge-response from the RFID tag; and
requesting the RFID tag to transmit authentication data and receiving an authentication data response from the RFID tag.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are a method and a system for authenticating a radio frequency identification (RFID) tag, by which an RFID reader and an authentication server authenticate the RFID tag by using a cryptographic operation and a protocol.
-
Citations
26 Claims
-
1. A method of authenticating an RFID (radio frequency identification) tag having a master key by an RFID reader, comprising:
-
requesting the RFID tag to transmit a security parameter and receiving a security parameter response from the RFID tag, wherein the RFID tag generates a session key based on the master key and a first random number,; transmitting a challenge to the RFID tag and receiving a challenge-response from the RFID tag; and requesting the RFID tag to transmit authentication data and receiving an authentication data response from the RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of authenticating in RFID environment, wherein a RFID tag having a master key is authenticated by an RFID reader, the method comprising:
-
generating a session key based on the master key and a first random number; receiving a security parameter request from the RFID reader and transmitting a security parameter to the RFID reader; receiving a challenge from the RFID reader and transmitting a challenge-response to the RFID reader; and receiving an authentication data request from the RFID reader and generating authentication data. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method by which an authentication server comprising information about a master key of an RFID tag supports an RFID reader to authenticate the RFID tag having the master key, comprising
receiving at the authentication server a request to verify authentication data from the RFID reader, wherein said authentication data is generated by the RFID tag,; -
generating authentication data based on the information about the master key; and determining whether the RFID tag has been successfully authenticated based on whether authentication data generated by the authentication server is equal to authentication data generated by the RFID tag. - View Dependent Claims (14, 15)
-
-
16. An RFID reader authenticating an RFID tag having a master key, comprising:
-
a security parameter obtainer which requests the RFID tag to transmit a security parameter and receives a security parameter response, wherein the RFID tag generates a session key based on the master key and a first random number,; a challenge processor which transmits a challenge to the RFID tag and receives a challenge-response; and an authenticator which requests the RFID tag to transmit authentication data and receives an authentication data response. - View Dependent Claims (17, 18, 19, 20)
-
-
21. An RFID tag having a master key, comprising:
-
a key generator which generates a session key based on the master key and a first random number; a security parameter provider which generates a security parameter in response to a security parameter request received from the RFID reader; a challenge processor which generates a challenge-response to a challenge received from the RFID reader; and an authentication data provider which provides authentication data in response to an authentication data request received from the RFID reader. - View Dependent Claims (22, 23)
-
-
24. An authentication server supporting an RFID reader to authenticate an RFID tag having a master key, comprising:
-
an operator which receives a request for verifying authentication data generated by the RFID tag from the RFID reader and generates authentication data based on pre-stored information about the master key of the RFID tag; and an authenticator which determines whether the RFID tag has been successfully authenticated based on whether the authentication data is equal to authentication data generated by the RFID tag. - View Dependent Claims (25, 26)
-
Specification