SYSTEM AND METHOD FOR AUTHENTICATING RFID TAGS
First Claim
1. A method of enabling a radio frequency identification (RFID) tag to be authenticated, the method comprising:
- generating a plurality of digital signatures, wherein each digital signature is generated using an index value unique to that digital signature and information associated with the RFID tag; and
storing the plurality of digital signatures on the RFID tag in association with respective index values to enable a desired digital signature to be selected according to a provided index value.
8 Assignments
0 Petitions
Accused Products
Abstract
A system and method of providing authenticity to a radio frequency identification (RFID) tag are provided. The method comprises generating a plurality of digital signatures, wherein each digital signature is generated using an index value unique to that digital signature and using information associated with the RFID tag; and storing the plurality of digital signatures on the RFID tag in association with respective index values to enable a desired digital signature to be selected according to a provided index value. Also provided are a system and method of enabling an RFID reader to authenticate an RFID tag, which utilize a challenge comprising an index value to request one of the stored signature and authenticating same. Also provided is an RFID tag that is configured to participate in the challenge-response protocol.
47 Citations
23 Claims
-
1. A method of enabling a radio frequency identification (RFID) tag to be authenticated, the method comprising:
-
generating a plurality of digital signatures, wherein each digital signature is generated using an index value unique to that digital signature and information associated with the RFID tag; and storing the plurality of digital signatures on the RFID tag in association with respective index values to enable a desired digital signature to be selected according to a provided index value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of authenticating an RFID tag, the method comprising:
-
randomly selecting an index value from a predefined range of index values; generating a challenge comprising the selected index value; providing the challenge to the RFID tag to enable the RFID tag to determine a corresponding digital signature stored thereon in association with the selected index value, wherein each digital signature has been generated using a respective index value unique to that digital signature and information associated with the RFID tag; obtaining a response from the RFID tag, the response comprising the corresponding digital signature; and authenticating the RHD tag using the corresponding digital signature. - View Dependent Claims (15)
-
-
16. An RFID reader configured for authenticating a RFID tag, the RFID reader comprising a cryptographic processor, a memory, and an interface for establishing a communicable connection to the RFID tag, the memory comprising computer executable instructions for causing the processor to authenticate the RFID tag by:
-
randomly selecting an index value from a predefined range of index values; generating a challenge comprising the selected index value; providing the challenge to the RFID tag to enable the RFID tag to determine a corresponding digital signature stored thereon in association with the selected index value, wherein each digital signature has been generated using a respective index value unique to that digital signature and information associated with the RFID tag; obtaining a response from the RFID tag, the response comprising the corresponding digital signature; and authenticating the RFID tag using the corresponding digital signature. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method of enabling an RFID reader to authenticate an RFID tag, the method comprising:
-
receiving a challenge from the RFID reader, the challenge comprising an index value randomly selected by the RFID reader from a predefined range of index values; obtaining a requested digital signature from a plurality of digital signatures each being stored on the RFID tag in association with a respective index value, the requested digital signature corresponding to the index value provided by the RFID reader, wherein each digital signature has been generated using a respective index value unique to that digital signature and information associated with the RFID tag; and providing a response to the RFID reader to enable the RFID reader to authenticate the RFID tag, wherein the response comprises the requested digital signature. - View Dependent Claims (22, 23)
-
Specification