VALIDATION METHOD AND SYSTEM FOR USE IN SECURING NOMADIC ELECTRONIC TRANSACTIONS
1 Assignment
0 Petitions
Accused Products
Abstract
A method involving a communication device, which comprises sending a request to a communication device; receiving a response from the communication device over a local communication path; deriving a received data set from said response; determining at least one data set that had been previously transmitted to the communication device over a wireless portion of a second communication path different from the local communication path; and validating the response based on the received data set and the at least one previously transmitted data set.
24 Citations
79 Claims
-
1-59. -59. (canceled)
-
60. A method for bulk reading of a plurality of tags each associated with a respective item of a plurality of similar items, comprising:
-
receiving a plurality of encrypted signatures each comprising an identifier common to the plurality of tags and a scrambling code unique to the respective tag; decrypting the plurality of signatures using a decryption key to obtain the identifier and respective scrambling codes; and validating each of the plurality of tags based on one or more of the identifier and the respective scrambling codes. - View Dependent Claims (61, 62, 63, 64, 65, 66, 67, 68, 69, 70)
-
-
71. A processing entity for bulk reading of a plurality of tags each associated with a respective item of a plurality of similar items, configured to:
-
receive a plurality of encrypted signatures each comprising an identifier common to the plurality of tags and a scrambling code unique to the respective tag; decrypt the plurality of signatures using a decryption key to obtain the identifier and respective scrambling codes; and validate each of the plurality of tags based on one or more of the identifier and the respective scrambling codes. - View Dependent Claims (72, 73, 74, 75, 76, 77)
-
-
78. A tag for generating an encrypted signature for an identifier common to a plurality of tags, comprising:
a controller configured to; generate a first scrambling code; augment the identifier with the first scrambling code; encrypt the identifier augmented with the first scrambling code using an encryption key to generate a first encrypted signature; in response to an event, generate a second scrambling code; augment the identifier with the second scrambling code; and encrypt the identifier augmented with the second scrambling code using the encryption key to generate a second encrypted signature. - View Dependent Claims (79)
Specification