RFID SECURITY AND MOBILITY ARCHITECTURE
First Claim
Patent Images
1. A method of communication between RFID devices, comprising:
- mutually authenticating the RFID devices; and
exchanging one or more encrypted payloads based on the encryption scheme.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of communication between RFID devices that includes mutually authenticating the RFID devices is disclosed. Once mutual authentication is completed, one or more encrypted messages based on the encryption scheme can be exchanged between the RFID devices.
135 Citations
30 Claims
-
1. A method of communication between RFID devices, comprising:
-
mutually authenticating the RFID devices; and exchanging one or more encrypted payloads based on the encryption scheme. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of communicating between RFID devices, comprising:
-
transmitting a collection command; receiving responses from one or more tag devices; for each tag device, mutually authenticating with each tag device and communicating encrypted messages with each tag device. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A security environment, including
a central server; one or more security domains in communication with the central server, wherein the one or more security domains includes one or more readers that mutually authenticate tags and exchange encrypted messages with tags. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
23. A method of providing tag security, comprising:
-
providing a tag security to a distribution center; writing the tag security into a tag at the distribution center; authenticating the tag at one or more shipping terminals on a shipping route; and decommissioning the tag at a decommissioning center. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
Specification