Systems and Methods for Zero-Power Security
First Claim
1. A system comprising:
- a device comprising at least one integrated circuit, wherein the device is vulnerable to unauthenticated access;
an antenna, and;
a zero-power, energy-harvesting reprogrammable computational module configured to communicate with the antenna to receive radio frequency signals and to communicate with the device,wherein the computational module is powered by a corresponding radio frequency signal and authenticates the source of the corresponding radio frequency signal using a secure challenge-response cryptographic function.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for utilizing zero-power, energy-harvesting computational modules to provide secure and reprogrammable wireless communications with vulnerable devices comprising integrated circuits (ICs), including active implantable medical devices, electronic lock and key systems, credit cards, access cards, identification cards and passports. The zero-power, energy-harvesting computational modules are powered by radio signals received from an interrogator, and requests from the interrogator are authenticated using an encrypted challenge-response mechanism. Communications between the interrogator and the vulnerable device are enabled if the interrogator requests have been authenticated, thus preventing unauthorized requests from reaching the vulnerable device.
-
Citations
74 Claims
-
1. A system comprising:
-
a device comprising at least one integrated circuit, wherein the device is vulnerable to unauthenticated access; an antenna, and; a zero-power, energy-harvesting reprogrammable computational module configured to communicate with the antenna to receive radio frequency signals and to communicate with the device, wherein the computational module is powered by a corresponding radio frequency signal and authenticates the source of the corresponding radio frequency signal using a secure challenge-response cryptographic function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 44)
-
-
34. A method of secure radio frequency communication with a vulnerable device, comprising the steps of:
-
providing a system comprising a device comprising at least one integrated circuit, wherein the device is vulnerable to unauthenticated access;
an antenna, and;
a zero-power, energy-harvesting reprogrammable computational module configured to communicate with the antenna to receive radio frequency signals and to communicate with the device, wherein the computational module is powered by a corresponding radio frequency signal and authenticates the source of the corresponding radio frequency signal using a cryptographic function;using the system to receive a corresponding radio frequency signal from an interrogator storing the energy in the received corresponding radio frequency signal; authenticating the interrogator using an encrypted challenge-response authentication mechanism between the zero-power, energy-harvesting reprogrammable computational module and the interrogator; and enabling communication between the interrogator and the device if the interrogator is authenticated. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 63, 64)
-
-
55. A method for communicating with an implantable medical device (IMD) comprising the steps of:
-
receiving a radio frequency (RF) signal from an interrogator, where the RF signal comprises a command for the IMD; harvesting energy from the RF signal; and sending the command to the IMD. - View Dependent Claims (56, 57, 58, 59, 60)
-
-
61. A method for securely communicating with an implantable medical device (IMD) comprising the steps of:
-
receiving an RF signal comprising an authentication request from an interrogator; authenticating the interrogator using energy harvested from the RF signal; and permitting access to the IMD if the interrogator is authenticated. - View Dependent Claims (62, 65, 66, 67, 68, 69, 70, 71, 72, 73)
-
-
74. A system comprising:
-
an electronic lock comprising an interrogator; a zero-power, energy-harvesting computational module configured to communicate with the electronic lock; and where the interrogator wirelessly transmits a radio frequency (RF) signal to the computational module, where the computational module is powered by the incoming RF signal.
-
Specification