Fully Secure Item-Level Tagging
First Claim
1. ) A supply chain visibility and product authentication system to improve supply chain efficiency and to assist brand owners in the protection of their brand. At the front of the system is a secure RFID tag encoder and downstream in the supply chain is a secure RFID tag authenticator;
- both are intermittently coupled through a security server with no real time connection required and all encryption functions stored off-tag. The system is comprised of;
RFID tags containing an access and kill password and a cryptographic key index;
a security server managing and providing a changing set of cryptographic keys over a distribution network;
one or more secure RFID encoders encoding the RFID tags using the set of cryptographic keys provided by the security server to create the access and kill password from data on the RFID tag. The cryptographic keys are hidden in protected memory of the secure RFID encoder; and
one or more secure RFID authenticators determining an authentic RFID tag by using the securely stored cryptographic keys provided by the security server and data from the RFID tag to compute a kill password and to compare the computed kill password with the kill password stored on the RFID tag.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides value to brand owners, retailers, and consumers through the use of radio frequency identification, stenography, nanolithography, fingerprints, novel heuristic threat evaluation, indication, and detection model. Additionally, using cryptography, tag passwords are formulated and identities are reversibly flipped, thus allowing item identities to remain secret to unauthorized observers. This unique combination of heuristics and authentication technologies provides an efficient means of finding and stopping the flow of counterfeit products throughout global supply chains. The present invention includes radio frequency identification (RFID) tags, encoders, servers, identity changers, and authenticity verifiers to make this task a viable and adaptive weapon against the elusive counterfeiters. The present end-to-end RFID system offers unprecedented security for retailers and consumers, while remaining efficient and scalable.
270 Citations
20 Claims
-
1. ) A supply chain visibility and product authentication system to improve supply chain efficiency and to assist brand owners in the protection of their brand. At the front of the system is a secure RFID tag encoder and downstream in the supply chain is a secure RFID tag authenticator;
- both are intermittently coupled through a security server with no real time connection required and all encryption functions stored off-tag. The system is comprised of;
RFID tags containing an access and kill password and a cryptographic key index; a security server managing and providing a changing set of cryptographic keys over a distribution network; one or more secure RFID encoders encoding the RFID tags using the set of cryptographic keys provided by the security server to create the access and kill password from data on the RFID tag. The cryptographic keys are hidden in protected memory of the secure RFID encoder; and one or more secure RFID authenticators determining an authentic RFID tag by using the securely stored cryptographic keys provided by the security server and data from the RFID tag to compute a kill password and to compare the computed kill password with the kill password stored on the RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7)
- both are intermittently coupled through a security server with no real time connection required and all encryption functions stored off-tag. The system is comprised of;
-
8. ) A secure RFID tag encoder enabled by authorizations to encode RFID tags used to identify and authenticate goods, comprising:
-
a unique encoder number; a processing means for computing and controlling encoder actions; an RFID tag interrogator means for modifying the state of the RFID tags in order to record a unique identifier and an encrypted password into each RFID tag; a means for receiving and hiding in encoder memory a changing set of cryptographic keys; a means of receiving authorizations that enable the encoding of a certain number of RFID tags for a given specified list of SKU'"'"'s; and a means to prevent physical or logical tampering with or monitoring of circuitry and signals that are used to produce the cryptographically secured codes. - View Dependent Claims (9, 10, 11, 12)
-
-
13. ) An RFID tag predisposed to identifying itself to an RFID reader its product identification code while preventing unauthorized duplication, malicious killing of tags, and hiding the product identification code from public view, comprised of:
-
a memory means; a means for storing an access and kill password in a partition of the memory means; a means for preventing the kill password from being read until unlocked; a means for unlocking the kill password using the access password; a means for storing a cryptographic key index in a partition of the memory means; a means for storing a password specification header in a partition of the memory means; a means for storing and reporting an alternate identity in a partition of the memory means, cryptographically related to the original product identification code using the cryptographic key index; and a means for indicating the use of the alternate identity to help facilitate converting the alternate identity back to the original product identification code using the cryptographic key index. - View Dependent Claims (14, 15, 16)
-
-
17. ) An RFID authenticator means for determining if an RFID tag is authentic, while not requiring a real-time network connection, comprising:
-
a means for securely storing a changing set of cryptographic keys provided from a security server; a means for determining the appropriate method to determine the access and kill passwords of the RFID tag by reading a password specification header stored on the RFID tag; a means for determining the authenticity of the RFID tag by computing a kill password using data from the RFID tag and the set of cryptographic keys, and comparing the computed kill password to the kill password stored on the RFID tag; and a means for exchanging heuristic information with the security server. - View Dependent Claims (18, 19)
-
-
20. ) An RFID interrogator for reversibly altering the identity of an RFID tag from a publicly readable and decodable form to an alternate identity that is cryptographically related to the first identity. The alteration of the identity is based upon steps that access a changing set of cryptographic keys that are locally stored in the RFID interrogator. The RFID interrogator is comprised of:
-
a means to read information and a cryptographic key index from the RFID tag; a means to acquire a changing set of cryptographic keys from a trusted source; a means to alter the primary identifying information in the RFID tag in a pattern that is cryptographically related to the original pattern using the changing set of cryptographic keys; a means to revert the RFID tag from the altered identity to the primary identification state using the changing set of cryptographic keys; and a means to determine if the RFID tag is either in the primary or altered identification tag state.
-
Specification