RADIO FREQUENCY IDENTIFICATION (RFID) TAG, INTERROGATOR, AND METHOD FOR AUTHENTICATION BETWEEN THE RFID TAG AND THE INTERROGATOR
First Claim
1. A radio frequency identification (RFID) tag authentication method performed by an interrogator, the method comprising:
- transmitting, to an RFID tag, a challenge command comprising random interrogator information for initializing an encryption engine and challenge interrogator information for authenticating the RFID tag;
receiving, from the RFID tag, random tag information, encrypted challenge tag information, and encrypted tag authentication data;
initializing the encryption engine based on the random interrogator information and to the random tag information;
decrypting the encrypted challenge tag information and the encrypted tag authentication data; and
authenticating the RFID tag based on the decrypted challenge tag information, the decrypted tag authentication data, and the challenge interrogator information.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided is a method for authentication between a radio frequency identification (RFID) tag and an interrogator configured to communicate with the RFID tag. An authentication method performed by the interrogator may include: transmitting, to an RFID tag, a challenge command comprising random interrogator information for initializing an encryption engine and challenge interrogator information for authenticating the RFID tag; receiving, from the RFID tag, random tag information, encrypted challenge tag information, and encrypted tag authentication data; initializing the encryption engine based on the random to interrogator information and the random tag information; decrypting the encrypted challenge tag information and the encrypted tag authentication data; and authenticating the RFID tag based on the decrypted challenge tag information, the decrypted tag authentication data, and the challenge interrogator information.
-
Citations
17 Claims
-
1. A radio frequency identification (RFID) tag authentication method performed by an interrogator, the method comprising:
-
transmitting, to an RFID tag, a challenge command comprising random interrogator information for initializing an encryption engine and challenge interrogator information for authenticating the RFID tag; receiving, from the RFID tag, random tag information, encrypted challenge tag information, and encrypted tag authentication data; initializing the encryption engine based on the random interrogator information and to the random tag information; decrypting the encrypted challenge tag information and the encrypted tag authentication data; and authenticating the RFID tag based on the decrypted challenge tag information, the decrypted tag authentication data, and the challenge interrogator information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An interrogator authentication method performed by a radio frequency identification (RFID) tag, the method comprising:
-
receiving, from an interrogator, a challenge command comprising random interrogator information for initializing an encryption engine and challenge interrogator information for authenticating the RFID tag; generating random tag information for initializing the encryption engine and challenge tag information for authenticating the interrogator; initializing the encryption engine based on the random interrogator information and the random tag information; generating tag authenticating data based on the challenge interrogator information and the challenge tag information; encrypting the challenge tag information and the tag authentication data; transmitting, to the interrogator, the random tag information, the encrypted challenge tag information, and the encrypted tag authentication; and authenticating the interrogator by decrypting re-encrypted challenge tag information that is received from the interrogator after an inventory procedure, and by comparing the decrypted challenge tag information and the challenge tag information generated by the RFID tag. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A mutual authentication method performed by an interrogator and a radio frequency identification (RFID) tag, the method comprising:
-
transmitting, by the interrogator to the RFID tag, a challenge command comprising random interrogator information for initializing an encryption engine and challenge interrogator information for authenticating the RFID tag; generating, by the RFID tag, random tag information for initializing the encryption engine and challenge tag information for authenticating the interrogator; initializing, by the RFID tag, the encryption engine based on the random tag information and the random interrogator information received from the interrogator; generating, by the RFID tag, tag authentication data based on the challenge tag information and the challenge interrogator information received from the interrogator; encrypting, by the RFID tag, the challenge tag information and the tag authentication data; transmitting, by the RFID tag to the interrogator, the random tag information, the encrypted challenge tag information, and the encrypted tag authentication data; initializing, by the interrogator, the encryption engine based on the random interrogator information and the random tag information received from the RFID tag; decrypting, by the interrogator, the encrypted challenge tag information and the encrypted tag authentication data received from the RFID tag; authenticating, by the interrogator, the RFID tag based on the decrypted challenge tag information, the decrypted tag authentication data, and the challenge interrogator information; re-encrypting, by the interrogator, the decrypted challenge tag information, and transmitting the re-encrypted challenge tag information to the RFID tag after an inventory procedure; and authenticating, by the RFID tag, the interrogator by decrypting the re-encrypted challenge tag information received from the interrogator, and by comparing the decrypted challenge tag information and the challenge tag information generated by the RFID tag.
-
-
15. A radio frequency identification (RFID) tag authentication method performed by an interrogator, the method comprising:
-
transmitting, to an RFID tag, a first challenge command comprising random interrogator information for initializing an encryption engine and a second challenge command comprising challenge interrogator information for authenticating the RFID tag; receiving, from the RFID tag, random tag information, encrypted challenge tag information, and encrypted tag authentication data; initializing the encryption engine based on the random interrogator information and the random tag information; decrypting the encrypted challenge tag information and the encrypted tag authentication data; and authenticating the RFID tag based on the decrypted challenge tag information, the decrypted tag authentication data, and the challenge interrogator information. - View Dependent Claims (16)
-
-
17. An interrogator authentication method performed by a radio frequency identification (RFID) tag, the method comprising:
-
receiving, from an interrogator, a first challenge command comprising random interrogator information for initializing an encryption engine and a second challenge command comprising challenge interrogator information for authenticating the RFID tag; generating random tag information for initializing the encryption engine and challenge tag information for authenticating the interrogator; initializing the encryption engine based on the random interrogator information and the random tag information; generating tag authentication data based on the challenge interrogator information and the challenge tag information; encrypting the challenge tag information and the tag authentication data; transmitting, to the interrogator, the random tag information, the encrypted challenge tag information, and the encrypted tag authentication data; and authenticating the interrogator by decrypting the re-encrypted challenge tag information received from the interrogator after an inventory procedure, and by comparing the decrypted challenge tag information and the challenge tag information generated by the RFID tag.
-
Specification