SYSTEMS AND METHODS FOR RFID SECURITY
1 Assignment
0 Petitions
Accused Products
Abstract
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.
18 Citations
66 Claims
-
1-44. -44. (canceled)
-
45. An apparatus comprising a tag for use in a system including a tag reader and a server communicatively coupled to the tag reader, the tag comprising:
-
a transceiver to communicate with the tag reader through a wireless link; and a processor coupled to the transceiver, the processor to execute sets of instructions to (i) send preliminary information of the tag to the server through the tag reader, (ii) receive, based on the preliminary information, an encryption key from the server through the tag reader, and (iii) encrypt, based on a predetermined encryption scheme, identification data identifying the tag using the encryption key, the identification data for the server to decrypt according to the predetermined encryption scheme using the encryption key. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52)
-
-
53. An apparatus comprising a tag for use in a system including a tag reader and a server communicatively coupled to the tag reader, the tag comprising:
-
a transceiver to communicate with the tag reader through a wireless link; a storage to store a plurality of encryption keys; and a processor coupled to the transceiver, the processor to execute sets of instructions to (i) receive, from the server through the tag reader, a pointer identifying one of the plurality of stored encryption keys, (ii) select the encryption key identified by the received pointer, and (iii) encrypt identification data identifying the tag using the selected encryption key, the identification data for the server to decrypt according to a predetermined encryption scheme using the encryption key. - View Dependent Claims (54, 55, 56, 57, 58, 59)
-
-
60. An apparatus comprising a tag for use in a system including a tag reader and a server communicatively coupled to the tag reader, the tag comprising:
-
a transceiver to communicate with the tag reader through a wireless link; a storage to store timing information; and a processor coupled to the transceiver, the processor to execute sets of instructions to (i) receive timing information, (ii) compare the timing information with previously stored timing information, (iii) generate an encryption key based on the comparison, and (iv) encrypt identification data identifying the tag using the encryption key, the identification data for the server to decrypt according to a predetermined encryption scheme using the encryption key. - View Dependent Claims (61, 62, 63, 64, 65, 66)
-
Specification