PRODUCTION METHOD, RFID TRANSPONDER, AUTHENTICATION METHOD, READER DEVICE AND COMPUTER PROGRAM PRODUCT
First Claim
1. A method for producing an RFID transponder, the method comprising the following steps:
- providing the transponder with a transponder-specific identifier;
providing the transponder with a signature usable for authentication of the transponder;
generating said signature by signing at least a part of the transponder-specific identifier,characterized in that said signature is stored in a hidden memory of the transponder.
10 Assignments
0 Petitions
Accused Products
Abstract
The exemplary embodiments of the invention realize an efficient prevention of massive infiltration of cloned RFID transponders into existing and new RFID systems. Furthermore, reader devices used for authentication of RFID transponders do not need to be on-line and do not need to be equipped with a Security Authentication Module (SAM). This simplifies authentication procedures and reduces costs. According to an exemplary embodiment of the invention a transponder-specific originality signature is stored by a transponder manufacturer on the transponder. The transponder-specific originality signature may, for example, be stored in the non-volatile memory (EEPROM) of the transponder during the fabrication of the transponder. This transponder-specific originality signature can be checked at any time in a convenient way, which provides an indication of originality of said transponder.
-
Citations
12 Claims
-
1. A method for producing an RFID transponder, the method comprising the following steps:
-
providing the transponder with a transponder-specific identifier; providing the transponder with a signature usable for authentication of the transponder; generating said signature by signing at least a part of the transponder-specific identifier, characterized in that said signature is stored in a hidden memory of the transponder. - View Dependent Claims (2, 3, 4, 6)
-
-
5. (canceled)
-
7. A method for authenticating an RFID transponder, wherein the authentication is performed by:
-
reading a transponder-specific identifier or a part of the transponder-specific identifier from the transponder; reading a signature from the transponder, said signature comprising the transponder-specific identifier or said part of the transponder-specific identifier in signed form; verifying the signature and determining that the transponder is authentic only if the signature is valid, characterized in that said signature is read from a hidden memory from the transponder by means of a dedicated command. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification