Radio Frequency Identification (RFID) Based Authentication System and Methodology
First Claim
1. A radio frequency identification (RFID) authentication system comprising:
- a RFID tag associated with a user, said RFID tag comprising a first memory storing a private key and a RFID tag antenna connected to said first memory, said RFID tag antenna transmitting said private key, when activated;
a RFID reader comprising a RFID reader antenna activating said RFID tag antenna and receiving said private key; and
a computer system in communication with said RFID reader, said computer system comprising;
a processor; and
a second memory in communication with said processor, said second memory storing encrypted data, said encrypted data being encrypted with a public key related to said private key, and said processor further using said private key, as transmitted by said RFID tag antenna to said RFID reader, to decrypt said encrypted data in order to generate decrypted data.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are embodiments of a radio frequency identification (RFID) authentication system and an associated authentication methodology. The embodiments incorporate an identification device (e.g., an identification badge, a key fob, etc.) with an embedded RFID tag. The embedded RFID tag is associated with a specific user and stores a private key generated as part of a public key-private key encryption scheme. The private key is read by an RFID reader and used to decode public key encrypted data stored within or accessible by a computer system (e.g., a desktop computer system, a laptop computer system, a personal digital assistant (PDA), a digital fax machine, wireless telephone, etc.). Thus, the embodiments provide a portable way to use public key-private key encryption scheme data anywhere using RFID technology.
-
Citations
25 Claims
-
1. A radio frequency identification (RFID) authentication system comprising:
-
a RFID tag associated with a user, said RFID tag comprising a first memory storing a private key and a RFID tag antenna connected to said first memory, said RFID tag antenna transmitting said private key, when activated; a RFID reader comprising a RFID reader antenna activating said RFID tag antenna and receiving said private key; and a computer system in communication with said RFID reader, said computer system comprising; a processor; and a second memory in communication with said processor, said second memory storing encrypted data, said encrypted data being encrypted with a public key related to said private key, and said processor further using said private key, as transmitted by said RFID tag antenna to said RFID reader, to decrypt said encrypted data in order to generate decrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A radio frequency identification (RFID) authentication method comprising:
-
activating an RFID tag antenna of an RFID tag associated with a user such that said RFID tag transmits a private key stored in a first memory of said RFID tag; receiving said private key; and using said private key to decrypt encrypted data in order to generate decrypted data, said encrypted data being encrypted using a public key related to said private key and further being stored locally in a second memory. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A radio frequency identification (RFID) authentication system comprising:
-
a RFID tag associated with a user, said RFID tag comprising a first memory storing a private key and a RFID tag antenna connected to said first memory, said RFID tag antenna transmitting said private key over a private frequency, when activated; a RFID reader comprising a RFID reader antenna activating said RFID tag antenna and receiving said private key; and a computer system in communication with said RFID reader, said computer system comprising; a processor; a second memory in communication with said processor, said second memory storing an encrypted password, said encrypted password being encrypted with a public key related to said private key, and said processor further using said private key, as transmitted by said RFID tag antenna to said RFID reader, to decrypt said encrypted password in order to generate a decrypted password; and a user interface in communication with said processor, said user interface prompting said user to enter an unencrypted password and said processor further comparing said unencrypted password, as entered by said user through said user interface, to said decrypted password in order to authenticate said user. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A radio frequency identification (RFID) authentication method comprising:
-
activating an RFID tag antenna of an RFID tag associated with a user such that said RFID tag transmits, over a private frequency, a private key stored in a first memory of said RFID tag; receiving said private key; using said private key to decrypt an encrypted password in order to generate a decrypted password, said encrypted password being encrypted using a public key related to said private key and being stored locally in a second memory; prompting said user to enter an unencrypted password; and comparing said unencrypted password, as entered by said user, to said decrypted password in order to authenticate said user. - View Dependent Claims (22, 23, 24, 25)
-
Specification