METHOD OF DETECTING A CONTERFEIT RFID TAG
First Claim
1. A method for determining a counterfeit from authentic RFID tag, comprising:
- assigning a unique tag identification number T wherein T=tag identification number TID;
locking the unique number T into tag memory;
assigning a secondary unique number E wherein E=a unique electronic product code EPC;
locking the unique number E into tag memory;
deriving a kill password K calculated based on an encryption algorithm f wherein K=f(T,E);
locking the kill password K into tag memory;
reading from the tag T′
=TID;
E′
=EPC; and
K′
=kill password;
calculating an expected kill password Ke based on the encryption algorithm f wherein Ke=f(T′
,E′
);
comparing Ke to K′
;
concluding the tag is suspected counterfeit if Ke does not equal K′
.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for determining a counterfeit from authentic RFID tag includes: assigning a unique tag identification number T wherein T=tag identification number TID; locking the unique number T into tag memory; assigning a secondary unique number E wherein E=a unique electronic product code EPC; locking the unique number E into tag memory; deriving a kill password K calculated based on an encryption algorithm f wherein K=f(T,E); locking the kill password K into tag memory; reading from the tag T′=TID; E′=EPC; and K′=kill password; calculating an expected kill password Ke based on the encryption algorithm f wherein Ke=f (T′,E′); comparing Ke to K′; concluding the tag is suspected counterfeit if Ke does not equal K′. It may further be concluded that the tag is authentic should the comparison result in Ke equaling K′.
13 Citations
12 Claims
-
1. A method for determining a counterfeit from authentic RFID tag, comprising:
-
assigning a unique tag identification number T wherein T=tag identification number TID; locking the unique number T into tag memory; assigning a secondary unique number E wherein E=a unique electronic product code EPC; locking the unique number E into tag memory; deriving a kill password K calculated based on an encryption algorithm f wherein K=f(T,E); locking the kill password K into tag memory; reading from the tag T′
=TID;
E′
=EPC; and
K′
=kill password;calculating an expected kill password Ke based on the encryption algorithm f wherein Ke=f(T′
,E′
);comparing Ke to K′
;concluding the tag is suspected counterfeit if Ke does not equal K′
. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for determining a counterfeit from an authentic RFID tag, comprising:
-
assigning a unique tag identification number T by a first party wherein T=tag identification number TID; locking the unique number T into tag memory by the first party; transferring the RFID tag to a second party; assigning a secondary unique number E by the second party wherein E=a unique electronic product code EPC; locking the unique number E into tag memory by the second party; deriving a kill password K by the second party calculated based on an encryption algorithm f wherein K=f(T,E); locking the kill password K by the second party into tag memory; reading from the tag T′
=TID;
E′
=EPC; and
K′
=kill password;calculating an expected kill password Ke based on the encryption algorithm f wherein Ke=f(T′
,E′
);comparing Ke to K′
;concluding the tag is suspected counterfeit if Ke does not equal K′
. - View Dependent Claims (12)
-
Specification