METHOD OF DETECTING A CONTERFEIT RFID TAG
First Claim
1. A method for determining a counterfeit from authentic RFID tag, comprising:
- assigning a unique tag identification number T wherein T=tag identification number TID;
locking the unique number T into tag memory;
assigning a secondary unique number E wherein E=a unique electronic product code EPC;
locking the unique number E into tag memory;
deriving a kill password K calculated based on an encryption algorithm f wherein K=f(T,E);
locking the kill password K into tag memory;
reading from the tag T′
=TID;
E′
=EPC; and
K′
=kill password;
calculating an expected kill password Ke based on the encryption algorithm f wherein Ke=f(T′
,E′
);
comparing Ke to K′
;
concluding the tag is suspected counterfeit if Ke does not equal K′
.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for determining a counterfeit from authentic RFID tag includes: assigning a unique tag identification number T wherein T=tag identification number TID; locking the unique number T into tag memory; assigning a secondary unique number E wherein E=a unique electronic product code EPC; locking the unique number E into tag memory; deriving a kill password K calculated based on an encryption algorithm f wherein K=f(T,E); locking the kill password K into tag memory; reading from the tag T′=TID; E′=EPC; and K′=kill password; calculating an expected kill password Ke based on the encryption algorithm f wherein Ke=f (T′,E′); comparing Ke to K′; concluding the tag is suspected counterfeit if Ke does not equal K′. It may further be concluded that the tag is authentic should the comparison result in Ke equaling K′.
-
Citations
12 Claims
-
1. A method for determining a counterfeit from authentic RFID tag, comprising:
-
assigning a unique tag identification number T wherein T=tag identification number TID; locking the unique number T into tag memory; assigning a secondary unique number E wherein E=a unique electronic product code EPC; locking the unique number E into tag memory; deriving a kill password K calculated based on an encryption algorithm f wherein K=f(T,E); locking the kill password K into tag memory; reading from the tag T′
=TID;
E′
=EPC; and
K′
=kill password;calculating an expected kill password Ke based on the encryption algorithm f wherein Ke=f(T′
,E′
);comparing Ke to K′
;concluding the tag is suspected counterfeit if Ke does not equal K′
. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for determining a counterfeit from an authentic RFID tag, comprising:
-
assigning a unique tag identification number T by a first party wherein T=tag identification number TID; locking the unique number T into tag memory by the first party; transferring the RFID tag to a second party; assigning a secondary unique number E by the second party wherein E=a unique electronic product code EPC; locking the unique number E into tag memory by the second party; deriving a kill password K by the second party calculated based on an encryption algorithm f wherein K=f(T,E); locking the kill password K by the second party into tag memory; reading from the tag T′
=TID;
E′
=EPC; and
K′
=kill password;calculating an expected kill password Ke based on the encryption algorithm f wherein Ke=f(T′
,E′
);comparing Ke to K′
;concluding the tag is suspected counterfeit if Ke does not equal K′
. - View Dependent Claims (12)
-
Specification