SYSTEMS AND METHODS FOR RFID SECURITY
1 Assignment
0 Petitions
Accused Products
Abstract
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.
8 Citations
64 Claims
-
1-44. -44. (canceled)
-
45. An apparatus comprising a tag for use in a system including a tag reader and a server communicatively coupled to the tag reader, the tag comprising:
-
a transceiver to communicate with the tag reader through a wireless link; and a processor coupled to the transceiver, the processor to execute sets of instructions to (i) receive information from the tag reader that enables encryption of identification data identifying the tag and (ii) encrypt the identification data according to the predetermined encryption scheme using the received information to produce encrypted data for the reader to transmit to the server, the encrypted data for the server to decrypt according to the predetermined encryption scheme in order to produce the identification data of the tag. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A method of transmitting information between a tag and a server via a reader, the method comprising:
-
at the tag, generating a pseudorandom number according to a predetermined scheme; and at the tag, encrypting identification data identifying the tag using the pseudorandom number, the predetermined scheme shared with the server for the server to generate a same pseudorandom number and decrypt the encrypted identification data using the pseudorandom number. - View Dependent Claims (55, 56, 57, 58, 59)
-
-
60. A system comprising:
-
a tag configured (i) to generate a pseudorandom number according to a predetermined scheme for encryption of identification data, the identification data identifying the tag, (ii) to encrypt the identification data using the generated pseudorandom number, and (iii) to send the encrypted identification data to a server; and the server configured (i) to receive the encrypted data transmitted by the tag, (ii) to generate a same pseudorandom number according to the predetermined scheme, and (iii) to decrypt the encrypted identification data using the generated pseudorandom number. - View Dependent Claims (61, 62, 63, 64)
-
Specification