Method for authenticating radio frequency identification
First Claim
1. An authentication method comprising:
- providing an RFID chip having a unique ID readable by a device;
applying the chip to an item via an adhesive;
associating the ID of the chip with the item and storing the associated ID at a first point in time; and
at a second point in time later than the first point in time, authenticating the item by reading the ID of the chip applied to the item and comparing with the ID associated with the item at the first point in time.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide a method of authenticating an item by affixing an RFID chip to the item. In one embodiment, an authentication method comprises providing an RFID chip having a unique ID readable by a device; applying the chip to an item via an adhesive; associating the ID of the chip with the item at a first point in time; and at a second point in time later than the first point in time, authenticating the item by reading the ID of the chip applied to the item and comparing with the ID associated with the item at the first point in time. The RFID chip cannot be easily removed and preferably cannot be removed without visible evidence of tampering, more preferably without destroying the RFID chip so that the ID of the RFID chip cannot be read.
23 Citations
25 Claims
-
1. An authentication method comprising:
-
providing an RFID chip having a unique ID readable by a device; applying the chip to an item via an adhesive; associating the ID of the chip with the item and storing the associated ID at a first point in time; and at a second point in time later than the first point in time, authenticating the item by reading the ID of the chip applied to the item and comparing with the ID associated with the item at the first point in time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An authentication method for a document comprising:
-
providing an RFID chip having a unique ID readable by a device; embedding the chip onto the document by an adhesive seal; transmitting the ID via a first path to a location different from where the embedding was processed; sending the document with the embedded chip to the location via a second path different from the first path; and authenticating the document by reading the ID of the chip embedded onto the document and comparing with the ID transmitted via the first path. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. An authentication method comprising:
-
providing an RFID chip having a unique ID readable by a device; affixing the chip to an article via an adhesive in such a manner that the chip cannot be removed from the article without rendering the ID of the RFID chip unreadable; associating the ID of the chip with the article; and subsequent to the associating, authenticating the article by reading the ID of the chip applied to the article and comparing with the ID associated with the article. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification