RFID FINGERPRINT CREATION AND UTILIZATION
First Claim
1. An object fingerprint creation method comprising:
- receiving a sensed signal from at least one radio frequency identification (RFID) reader resulting from at least one RFID tag affixed to a target object;
extracting a voltage produced by the RFID tag from the sensed signal; and
,storing the voltage as a fingerprint for the target object for later comparison with another fingerprint for an authenticating object to determine whether or not the authenticating object is the target object.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide a method, system and computer program product for creating and managing radio frequency identification (RFID) fingerprints to ensure item authenticity. In an embodiment of the invention, an object fingerprint creation method can be provided. The method can include receiving a sensed signal from at least one RFID reader resulting from at least one RFID tag affixed to a target object. The method further can include extracting a voltage produced by the RFID tag from the sensed signal. Finally, the method can include storing the voltage as a fingerprint for the target object for later comparison with another fingerprint for an authenticating object to determine whether or not the authenticating object is the target object.
229 Citations
12 Claims
-
1. An object fingerprint creation method comprising:
-
receiving a sensed signal from at least one radio frequency identification (RFID) reader resulting from at least one RFID tag affixed to a target object; extracting a voltage produced by the RFID tag from the sensed signal; and
,storing the voltage as a fingerprint for the target object for later comparison with another fingerprint for an authenticating object to determine whether or not the authenticating object is the target object. - View Dependent Claims (2, 3, 4)
-
-
5. An object authenticating data processing system comprising:
-
a host computer comprising a processor, memory, and an operating system executing therein; a radio frequency identification (RFID) data acquisition application hosted by the operating system and coupled to a plurality of RFID readers positioned to define a sensing zone; a data store of stored fingerprints each corresponding to a different target object; and
,a fingerprint module coupled to the RFID data acquisition application and configured for execution in the memory of the host computer by the processor of the host computer, the module comprising computer program instructions which when executed by the processor receive a sensed signal from the RFID data acquisition application for the RFID readers resulting from a plurality of RFID tags affixed to an authenticating object disposed in the sensing zone, extract a voltage produced by each of the RFID tags from the sensed signal, arrange each extracted voltage into a current fingerprint, and compare the current fingerprint with another fingerprint for an already processed object to determine whether or not the authenticating object is the already processed object. - View Dependent Claims (6, 7, 8)
-
-
9. A computer program product comprising a computer usable medium embodying computer usable program code for object fingerprint creation, the computer program product comprising:
-
computer usable program code for receiving a sensed signal from at least one radio frequency identification (RFID) reader resulting from at least one RFID tag affixed to a target object; computer usable program code for extracting a voltage produced by the RFID tag from the sensed signal; and
,computer usable program code for storing the voltage as a fingerprint for the target object for later comparison with another fingerprint for an authenticating object to determine whether or not the authenticating object is the target object. - View Dependent Claims (10, 11, 12)
-
Specification