VERIFICATION OF MOVEMENT OF ITEMS
First Claim
1. A method of verifying a route taken during movement of an RFID tag (4) between different entities of an authorized route;
- the method comprising;
first verification apparatus (10) associated with a first entity of the authorized route using a first private key (68) to provide, for a given RFID tag identity, a first encrypted signature (9) that is written to an RFID tag (4);
second verification apparatus (20) associated with a second entity of the authorized route using a public key (64) to decrypt the encrypted signature (9) from data read out from the RFID tag (4); and
the second verification apparatus (20) verifying whether the decrypted signature (9) corresponds to an entity from which the second entity is authorized to receive an RFID tag (4) with the given RFID tag identity.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, apparatus and system for verifying a route taken during movement of an RFID tag (4) between different entities of an authorized route. The method comprises: first verification apparatus (10) associated with a first entity using a first private key (68) to provide a first encrypted signature (9) that is written to an RFID tag (4); second verification apparatus (20) associated with a second entity using a public key (64) to decrypt the signature (9) from data read out from the RFID tag (4); and the second verification apparatus (20) verifying that the decrypted signature (9) corresponds to an entity from which the second entity is authorized to receive the given RFID tag identity. The second verification apparatus (20) may use a second private key (68) to provide a second encrypted signature (9) that is written to the RFID tag (4).
-
Citations
27 Claims
-
1. A method of verifying a route taken during movement of an RFID tag (4) between different entities of an authorized route;
- the method comprising;
first verification apparatus (10) associated with a first entity of the authorized route using a first private key (68) to provide, for a given RFID tag identity, a first encrypted signature (9) that is written to an RFID tag (4); second verification apparatus (20) associated with a second entity of the authorized route using a public key (64) to decrypt the encrypted signature (9) from data read out from the RFID tag (4); and the second verification apparatus (20) verifying whether the decrypted signature (9) corresponds to an entity from which the second entity is authorized to receive an RFID tag (4) with the given RFID tag identity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
- the method comprising;
-
12. A method of setting up a system for verifying a route taken during movement of an RFID tag (4), the method comprising:
-
a controller apparatus (6) distributing public keys, private keys and entity-specific policies to a plurality of verification apparatus (10, 20, 30), each verification apparatus being associated with a respective entity of a plurality of entities of an authorized route for a given RFID tag identity; wherein a private key (68) distributed to the verification apparatus (10) associated with a first entity corresponds to a public key (64) distributed to the verification apparatus (20) associated with a second entity according to a policy (62) distributed to the verification apparatus (20) associated with the second entity, for the given RFID tag identity. - View Dependent Claims (13, 14, 15, 16)
-
-
17. Verification apparatus for use in verification of a route taken during movement of an RFID tag (4), the verification apparatus comprising:
-
one or more stores (54, 50, 52) for storing a private key (68), a public key (64), and a policy (62); and one or more processors arranged to; (i) receive, from an RFID tag reader (22), data (60) read-out from the RFID tag (4) and comprising an RFID tag identity and an encrypted signature (9); (ii) use the public key (64) to decrypt the encrypted signature (9) from the data (60) read-out from the RFID tag (4); (iii) verify that the decrypted signature (9) corresponds to a first entity from which, according to the policy (62), a second entity associated with the verification apparatus is authorized to receive an RFID tag (4) with the given RFID tag identity; (iv) use the private key (68) to provide, for the given RFID tag identity, a new encrypted signature (9); and (v) forward data (70) comprising the new encrypted signature (9) to an RFID tag writer (22) for writing to the RFID tag (4). - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification