Challenged-based tag authentication model
-
0Associated
Cases -
0Associated
Defendants -
0Accused
Products -
189Forward
Citations -
0
Petitions -
1
Assignment
First Claim
1. A method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information, the method comprising:
- sending, from the reader, a message to the tag;
the tag, in response to the message, generating a challenge value and sending the challenge value to the reader;
in any order;
the reader performing a mathematical operation on the challenge value based upon a key value, stored in the reader to generate a challenge reply and sending the challenge reply to the tag; and
prior to receiving the challenge reply from the reader, the tag independently computing a challenge response based on an identical key value and mathematical operation stored in the tag;
the tag comparing the challenge response computed by the tag with the challenge reply sent by the reader; and
the tag authenticating the reader if the challenge response matches the challenge reply.
1 Assignment
0 Petitions

Accused Products

Abstract
A method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information comprises sending, from the reader, a message to the tag; the tag, in response to the message, generating a challenge value and sending the challenge value to the reader; in any order: the reader performing a mathematical operation on the challenge value based upon a key value to generate a challenge reply and sending the challenge reply to the tag and the tag independently computing a challenge response based on the key value and mathematical operation; the tag comparing the challenge response computed by the tag with the challenge reply sent by the reader; and the tag authenticating the reader if the challenge response matches the challenge reply. An RFID system including an RFID tag and a reader are configured to perform the above steps.
218 Citations
Hand geometry recognition biometrics on a fob | ||
Patent #
US 7,886,157 B2
Filed 01/31/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
RFID-based product manufacturing and lifecycle management | ||
Patent #
US 7,931,197 B2
Filed 09/20/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Mobile RFID reader with integrated location awareness for material tracking and management | ||
Patent #
US 7,932,827 B2
Filed 06/16/2008
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
METHOD AND SYSTEM FOR SECURE RFID COMMUNICATION BETWEEN A NOISY READER AND A COMMUNICATING OBJECT | ||
Patent #
US 20110084796A1
Filed 10/07/2010
|
Current Assignee
Commissariat a LEnergie Atomique
|
Sponsoring Entity
Commissariat a LEnergie Atomique
|
SECURE DATA COMMUNICATION USING ELLIPTIC CURVE CRYPTOLOGY | ||
Patent #
US 20110081016A1
Filed 10/06/2009
|
Current Assignee
Infineon Technologies AG
|
Sponsoring Entity
Infineon Technologies AG
|
SYSTEM AND METHOD FOR OPERATING AN RFID SYSTEM WITH HEAD TRACKING | ||
Patent #
US 20110102149A1
Filed 10/30/2009
|
Current Assignee
Symbol Technologies LLC
|
Sponsoring Entity
Symbol Technologies LLC
|
METHOD FOR AUTHENTICATING AN ENTITY BY A VERIFIER | ||
Patent #
US 20110107102A1
Filed 06/16/2009
|
Current Assignee
Orange S.A.
|
Sponsoring Entity
Orange S.A.
|
RFID reader and RFID tag using UHF band and action methods thereof | ||
Patent #
US 7,978,077 B2
Filed 02/23/2006
|
Current Assignee
Samsung Electronics Co. Ltd.
|
Sponsoring Entity
Samsung Electronics Co. Ltd.
|
Wireless personal information carrier having logic for connecting a battery only during data transfers | ||
Patent #
US 8,004,409 B2
Filed 02/13/2007
|
Current Assignee
Physical Optics Corporation
|
Sponsoring Entity
Physical Optics Corporation
|
Authorized sample receiver | ||
Patent #
US 8,016,201 B2
Filed 12/07/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
Systems and methods that integrate radio frequency identification (RFID) technology with industrial controllers | ||
Patent #
US 7,997,475 B2
Filed 02/29/2008
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
RF transactions using a wireless reader grid | ||
Patent #
US 8,009,018 B2
Filed 04/27/2010
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
System for biometric security using a fob | ||
Patent #
US 7,988,038 B2
Filed 09/06/2007
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
Systems and methods that integrate radio frequency identification (RFID) technology with agent-based control systems | ||
Patent #
US 7,994,919 B2
Filed 06/10/2009
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Access to distributed databases via pointer stored in RFID tag | ||
Patent #
US 8,025,227 B2
Filed 09/30/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Tag authentication method using rotation, and tag and reader performing the method | ||
Patent #
US 8,031,055 B2
Filed 02/21/2008
|
Current Assignee
Samsung Electronics Co. Ltd.
|
Sponsoring Entity
Samsung Electronics Co. Ltd.
|
Enhanced RFID instrument security | ||
Patent #
US 8,049,594 B1
Filed 05/25/2005
|
Current Assignee
Qualcomm FYX Incorporated
|
Sponsoring Entity
Xatra Fund MX LLC
|
RF transaction authentication using a random number | ||
Patent #
US 8,066,181 B2
Filed 10/22/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
RFID tag data affecting automation controller with internal database | ||
Patent #
US 7,764,191 B2
Filed 07/26/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
TARGET IDENTIFICATION METHOD FOR A SYNTHETIC APERATURE RADAR SYSTEM | ||
Patent #
US 20100277364A1
Filed 06/19/2007
|
Current Assignee
Telespazio SPA
|
Sponsoring Entity
Telespazio SPA
|
RFID AUTHENTICATION ARCHITECTURE AND METHODS FOR RFID AUTHENTICATION | ||
Patent #
US 20100150348A1
Filed 01/30/2009
|
Current Assignee
Smartrac Technology Fletcher Inc.
|
Sponsoring Entity
Smartrac Technology Fletcher Inc.
|
CONTROLLING DATA ACCESS TO AND FROM AN RFID DEVICE | ||
Patent #
US 20100073147A1
Filed 05/09/2007
|
Current Assignee
Koninklijke Philips N.V.
|
Sponsoring Entity
Koninklijke Philips N.V.
|
SYSTEM FOR BIOMETRIC SECURITY USING A FOB | ||
Patent #
US 20100030633A1
Filed 09/06/2007
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Liberty Peak Ventures LLC
|
METHOD AND SYSTEM FOR AUTHENTICATING RFID TAG | ||
Patent #
US 20100001840A1
Filed 07/06/2009
|
Current Assignee
Electronics and Telecommunications Research Institute
|
Sponsoring Entity
Electronics and Telecommunications Research Institute
|
Contact-less tag with signature, and applications thereof | ||
Patent #
US 7,806,325 B2
Filed 12/11/2008
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
Intelligent RFID tag for magnetic field mapping | ||
Patent #
US 7,772,978 B1
Filed 11/03/2008
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
System for locating a plurality of objects | ||
Patent #
US 7,667,590 B1
Filed 06/26/2006
|
Current Assignee
Linda Ryan, Gary Ryan
|
Sponsoring Entity
Linda Ryan, Gary Ryan
|
Systems and Methods for Zero-Power Security | ||
Patent #
US 20100085160A1
Filed 08/14/2009
|
Current Assignee
University Of Massachusetts
|
Sponsoring Entity
University Of Massachusetts
|
RADIO FREQUENCY IDENTIFICATION (RFID) BASED AUTHENTICATION METHODOLOGY USING STANDARD AND PRIVATE FREQUENCY RFID TAGS | ||
Patent #
US 20100011212A1
Filed 07/11/2008
|
Current Assignee
Daedalus Group LLC
|
Sponsoring Entity
Daedalus Group LLC
|
Radio Frequency Identification (RFID) Based Authentication System and Methodology | ||
Patent #
US 20100011211A1
Filed 07/09/2008
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
GENERATION OF COMMUNICATION DEVICE SIGNATURES FOR USE IN SECURING NOMADIC ELECTRONIC TRANSACTIONS | ||
Patent #
US 20100185865A1
Filed 12/21/2009
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
RF TRANSACTIONS USING A WIRELESS READER GRID | ||
Patent #
US 20100201484A1
Filed 04/27/2010
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Liberty Peak Ventures LLC
|
Process control monitoring systems, industrial plants, and process control monitoring methods | ||
Patent #
US 7,791,480 B2
Filed 06/11/2007
|
Current Assignee
Battelle Memorial Institute
|
Sponsoring Entity
Battelle Memorial Institute
|
CONTACT-LESS TAG WITH SIGNATURE, AND APPLICATIONS THEREOF | ||
Patent #
US 20100320269A1
Filed 09/01/2010
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
Object tagged with RFID tag and device and method for processing it | ||
Patent #
US 7,474,212 B2
Filed 07/07/2005
|
Current Assignee
Toshiba Teli Corporation
|
Sponsoring Entity
Toshiba Teli Corporation
|
RF TRANSACTION AUTHENTICATION USING A RANDOM NUMBER | ||
Patent #
US 20090044012A1
Filed 10/22/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
-
|
Method and Device for Agreeing Shared Key Between First Communication Device and Second Communication Device | ||
Patent #
US 20090041251A1
Filed 01/26/2007
|
Current Assignee
Siemens AG
|
Sponsoring Entity
-
|
WIRELESS DEVICE AUTHENTICATION AND SECURITY KEY MANAGEMENT | ||
Patent #
US 20090034736A1
Filed 08/02/2007
|
Current Assignee
Motorola Solutions Inc.
|
Sponsoring Entity
Motorola Solutions Inc.
|
Method and apparatus to eliminate theft of electronic equipment using existing telephone jack | ||
Patent #
US 7,510,580 B2
Filed 11/21/2003
|
Current Assignee
Ziad Zakaria
|
Sponsoring Entity
Ziad Zakaria
|
DNA SAMPLE DATA IN A TRANSPONDER TRANSACTION | ||
Patent #
US 20090079546A1
Filed 10/31/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Liberty Peak Ventures LLC
|
RFID system utilizing parametric reradiated technology | ||
Patent #
US 7,498,940 B2
Filed 06/21/2005
|
Current Assignee
VUBIQ NETWORKS INC.
|
Sponsoring Entity
VUBIQ INCORPORATED
|
RFID architecture in an industrial controller environment | ||
Patent #
US 7,510,110 B2
Filed 09/08/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Methods and apparatus for authenticating devices in a network environment | ||
Patent #
US 7,515,901 B1
Filed 02/25/2004
|
Current Assignee
Oracle America Inc.
|
Sponsoring Entity
Sun Microsystems Incorporated
|
Funding a Radio Frequency Device Transaction | ||
Patent #
US 20090106157A1
Filed 12/17/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Liberty Peak Ventures LLC
|
RFID MUTUAL AUTHENTICATION VERIFICATION SESSION | ||
Patent #
US 20090096584A1
Filed 10/01/2008
|
Current Assignee
Amtech Systems LLC
|
Sponsoring Entity
Amtech Systems LLC
|
TAG AUTHENTICATION METHOD USING ROTATION, AND TAG AND READER PERFORMING THE METHOD | ||
Patent #
US 20090102606A1
Filed 02/21/2008
|
Current Assignee
Samsung Electronics Co. Ltd.
|
Sponsoring Entity
Samsung Electronics Co. Ltd.
|
Low-complexity cryptographic techniques for use with radio frequency identification devices | ||
Patent #
US 7,532,104 B2
Filed 02/19/2004
|
Current Assignee
Emc IP Holding Company LLC
|
Sponsoring Entity
RSA Security LLC
|
BIOMETRIC AUTHORIZATION OF AN RF TRANSACTION | ||
Patent #
US 20090125401A1
Filed 12/17/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Liberty Peak Ventures LLC
|
AUTHORIZED SAMPLE RECEIVER | ||
Patent #
US 20090119220A1
Filed 12/07/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Liberty Peak Ventures LLC
|
Contact-less tag with signature, and applications thereof | ||
Patent #
US 20090160649A1
Filed 12/11/2008
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
Contact-less tag with signature, and applications thereof | ||
Patent #
US 20090159666A1
Filed 12/11/2008
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
Contact-less tag with signature, and applications thereof | ||
Patent #
US 20090161872A1
Filed 12/11/2008
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
Contact-less tag with signature, and applications thereof | ||
Patent #
US 20090160615A1
Filed 12/11/2008
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
Systems and methods that integrate radio frequency identification (RFID) technology with agent-based control systems | ||
Patent #
US 7,551,081 B2
Filed 11/10/2004
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Methods and Apparatuses to Secure Data Transmission in RFID Systems Against Eavesdropping | ||
Patent #
US 20090214037A1
Filed 02/26/2008
|
Current Assignee
Round Rock Research LLC
|
Sponsoring Entity
Round Rock Research LLC
|
METHOD AND SYSTEM FOR VALIDATING A DEVICE THAT USES A DYNAMIC IDENTIFIER | ||
Patent #
US 20090216679A1
Filed 12/23/2008
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
Verifying Vehicle Authenticity | ||
Patent #
US 20090212929A1
Filed 02/27/2008
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
DYNAMIC IDENTIFIER FOR USE IN IDENTIFICATION OF A DEVICE | ||
Patent #
US 20090240946A1
Filed 12/23/2008
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
Method of Utilizing Parametric Reflective Technology | ||
Patent #
US 20090219144A1
Filed 12/02/2008
|
Current Assignee
VUBIQ INC.
|
Sponsoring Entity
VUBIQ INC.
|
SYSTEMS AND METHODS THAT INTEGRATE RADIO FREQUENCY IDENTIFICATION (RFID) TECHNOLOGY WITH AGENT-BASED CONTROL SYSTEMS | ||
Patent #
US 20090243808A1
Filed 06/10/2009
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Security and Data Collision Systems and Related Techniques for Use With Radio Frequency Identification Systems | ||
Patent #
US 20090267747A1
Filed 03/23/2009
|
Current Assignee
Dr. Daniel W. Engels, Ronald L. Rivest, Sanjay Sarma, Stephen A. Weis
|
Sponsoring Entity
Dr. Daniel W. Engels, Ronald L. Rivest, Sanjay Sarma, Stephen A. Weis
|
SYSTEMS AND METHODS THAT INTEGRATE RADIO FREQUENCY IDENTIFICATION (RFID) TECHNOLOGY WITH AGENT-BASED CONTROL SYSTEMS | ||
Patent #
US 20090254199A1
Filed 06/10/2009
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Reconciliation mechanism using RFID and sensors | ||
Patent #
US 7,616,117 B2
Filed 07/19/2005
|
Current Assignee
Propack Data GmbH
|
Sponsoring Entity
Propack Data GmbH
|
System for providing secure access to KVM switch and other server management systems | ||
Patent #
US 7,613,927 B2
Filed 11/12/2004
|
Current Assignee
RIIP Inc.
|
Sponsoring Entity
RIIP Inc.
|
Micro-chip ID | ||
Patent #
US 20090273439A1
Filed 05/01/2008
|
Current Assignee
Richard Selsor
|
Sponsoring Entity
Richard Selsor
|
RFID tag programming, printing application, and supply chain/global registration architecture | ||
Patent #
US 7,636,044 B1
Filed 05/13/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Remote communications devices, wireless communications systems, and wireless communications methods | ||
Patent #
US 7,317,382 B2
Filed 12/13/2004
|
Current Assignee
Battelle Memorial Institute
|
Sponsoring Entity
Battelle Memorial Institute
|
Component authentication for computer systems | ||
Patent #
US 20080024268A1
Filed 07/14/2006
|
Current Assignee
Intel Corporation
|
Sponsoring Entity
Intel Corporation
|
Semi-passive radio frequency identification (RFID) tag with active beacon | ||
Patent #
US 7,348,875 B2
Filed 05/04/2004
|
Current Assignee
Battelle Memorial Institute
|
Sponsoring Entity
Battelle Memorial Institute
|
Systems and methods that integrate radio frequency identification (RFID) technology with industrial controllers | ||
Patent #
US 7,339,476 B2
Filed 11/10/2004
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Interface configuration by a memory tag | ||
Patent #
US 7,362,625 B2
Filed 10/25/2005
|
Current Assignee
Hewlett-Packard Development Company L.P.
|
Sponsoring Entity
Hewlett-Packard Development Company L.P.
|
Methods and Systems for Improving RFID Security | ||
Patent #
US 20080094220A1
Filed 10/19/2007
|
Current Assignee
Sanjay Sarma, Joseph Foley
|
Sponsoring Entity
Sanjay Sarma
|
SECURITY FEATURE RFID CARD | ||
Patent #
US 20080121710A1
Filed 11/02/2007
|
Current Assignee
Assa Abloy AB
|
Sponsoring Entity
Assa Abloy AB
|
HAND GEOMETRY RECOGNITION BIOMETRICS ON A FOB | ||
Patent #
US 20080140580A1
Filed 01/31/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Liberty Peak Ventures LLC
|
Mobile RFID reader with integrated location awareness for material tracking and management | ||
Patent #
US 7,388,491 B2
Filed 07/20/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Method and Apparatus to Provide Authentication and Privacy with Low Complexity Devices | ||
Patent #
US 20080170695A1
Filed 06/11/2007
|
Current Assignee
Symantec Corporation
|
Sponsoring Entity
-
|
Wireless personal information carrier having logic for connecting a battery only during data transfers | ||
Patent #
US 20080191876A1
Filed 02/13/2007
|
Current Assignee
Physical Optics Corporation
|
Sponsoring Entity
-
|
SECURING METHOD AND MOBILE DEVICE THUS SECURED | ||
Patent #
US 20080218347A1
Filed 03/03/2008
|
Current Assignee
COMPAGNIE INDUSTRIELLE ET FINANCIERE DIGENIERIE INGENICO
|
Sponsoring Entity
COMPAGNIE INDUSTRIELLE ET FINANCIERE DIGENIERIE INGENICO
|
Electronic tag data writing method and electronic tag read/write apparatus | ||
Patent #
US 20080224832A1
Filed 01/30/2008
|
Current Assignee
Hitachi Ltd.
|
Sponsoring Entity
Hitachi Ltd.
|
System and Method for Remotely Deactivating a Vehicle | ||
Patent #
US 20080258890A1
Filed 05/31/2007
|
Current Assignee
Inthinc Technology Solutions Incorporated
|
Sponsoring Entity
Inthinc Technology Solutions Incorporated
|
Intelligent RFID tag for magnetic field mapping | ||
Patent #
US 7,446,662 B1
Filed 09/26/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
RFID mutual authentication verification session | ||
Patent #
US 7,450,010 B1
Filed 04/17/2006
|
Current Assignee
Amtech Systems LLC
|
Sponsoring Entity
TC License Limited
|
RFID system utilizing parametric reflective technology | ||
Patent #
US 7,460,014 B2
Filed 06/21/2005
|
Current Assignee
VUBIQ NETWORKS INC.
|
Sponsoring Entity
VUBIQ INCORPORATED
|
Method for automatic identification control and management | ||
Patent #
US 7,461,264 B2
Filed 10/12/2004
|
Current Assignee
Lite-On Technology Corporation
|
Sponsoring Entity
Lite-On Technology Corporation
|
Reconciliation mechanism using RFID and sensors | ||
Patent #
US 20070018819A1
Filed 07/19/2005
|
Current Assignee
Propack Data GmbH
|
Sponsoring Entity
Propack Data GmbH
|
Mobile RFID reader with integrated location awareness for material tracking and management | ||
Patent #
US 20070018820A1
Filed 07/20/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Enhanced controller utilizing RFID technology | ||
Patent #
US 20070035396A1
Filed 08/10/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
RFID tag data affecting automation controller with internal database | ||
Patent #
US 20070024463A1
Filed 07/26/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
RFID architecture in an industrial controller environment | ||
Patent #
US 20070055470A1
Filed 09/08/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
RFID-based product manufacturing and lifecycle management | ||
Patent #
US 20070063029A1
Filed 09/20/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Sensor fusion for RFID accuracy | ||
Patent #
US 20070052540A1
Filed 09/06/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
RFID reader with programmable I/O control | ||
Patent #
US 20070075832A1
Filed 09/30/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Controlling deactivation of RFID tags | ||
Patent #
US 20070081671A1
Filed 10/11/2005
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
Access to distributed databases via pointer stored in RFID tag | ||
Patent #
US 20070075128A1
Filed 09/30/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Tag authentication apparatus and method for radio frequency identification system | ||
Patent #
US 20070133807A1
Filed 11/30/2006
|
Current Assignee
Electronics and Telecommunications Research Institute
|
Sponsoring Entity
Electronics and Telecommunications Research Institute
|
Secure two-way RFID communications | ||
Patent #
US 20070177738A1
Filed 02/17/2006
|
Current Assignee
Impinj Incorporated
|
Sponsoring Entity
Impinj Incorporated
|
Security Provision in Standards-Compliant RFID Systems | ||
Patent #
US 20070194889A1
Filed 02/05/2007
|
Current Assignee
Emc IP Holding Company LLC
|
Sponsoring Entity
Emc IP Holding Company LLC
|
Process control monitoring systems, industrial plants, and process control monitoring methods | ||
Patent #
US 20070239400A1
Filed 06/11/2007
|
Current Assignee
Stephen Gosselin, Joe Harris, James Skorpik
|
Sponsoring Entity
Stephen Gosselin, Joe Harris, James Skorpik
|
Loss prevention system | ||
Patent #
US 7,002,473 B2
Filed 12/17/2003
|
Current Assignee
Rateze Remote Mgmt. L.L.C.
|
Sponsoring Entity
Glick Larry D., Glick Renee A.
|
Means and method for providing secure access to KVM switch and other server management systems | ||
Patent #
US 20060107061A1
Filed 11/12/2004
|
Current Assignee
RIIP Inc.
|
Sponsoring Entity
RIIP Inc.
|
Interface configuration by a memory tag | ||
Patent #
US 20060094380A1
Filed 10/25/2005
|
Current Assignee
Hewlett-Packard Development Company L.P.
|
Sponsoring Entity
Hewlett-Packard Development Company L.P.
|
Backscatter communication device wake-up methods, communication device wake-up methods, and radio frequency identification device wake-up methods | ||
Patent #
US 20060100001A1
Filed 12/14/2005
|
Current Assignee
Michael A. Hughes, Richard M. Pratt
|
Sponsoring Entity
Michael A. Hughes, Richard M. Pratt
|
Systems and methods that integrate radio frequency identification (RFID) technology with industrial controllers | ||
Patent #
US 20060108411A1
Filed 11/10/2004
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Systems and methods that integrate radio frequency identification (RFID) technology with agent-based control systems | ||
Patent #
US 20060097873A1
Filed 11/10/2004
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Remote communications devices, wireless communications systems, and wireless communications methods | ||
Patent #
US 20060139168A1
Filed 12/13/2004
|
Current Assignee
Battelle Memorial Institute
|
Sponsoring Entity
Battelle Memorial Institute
|
Radio frequency security system, method for a building facility or the like, and apparatus and methods for remotely monitoring the status of fire extinguishers | ||
Patent #
US 7,081,815 B2
Filed 09/23/2003
|
Current Assignee
Battelle Memorial Institute
|
Sponsoring Entity
Battelle Memorial Institute
|
RFID reader and RFID tag using UHF band and action methods thereof | ||
Patent #
US 20060197651A1
Filed 02/23/2006
|
Current Assignee
Samsung Electronics Co. Ltd.
|
Sponsoring Entity
Samsung Electronics Co. Ltd.
|
Communication system for traceability monitoring | ||
Patent #
US 20060265584A1
Filed 09/03/2004
|
Current Assignee
FIDALIS
|
Sponsoring Entity
FIDALIS
|
Intelligent cash control system | ||
Patent #
US 20060293783A1
Filed 06/02/2005
|
Current Assignee
Jcm American Corporation
|
Sponsoring Entity
Jcm American Corporation
|
Loss prevention system | ||
Patent #
US 20050134459A1
Filed 12/17/2003
|
Current Assignee
Rateze Remote Mgmt. L.L.C.
|
Sponsoring Entity
Rateze Remote Mgmt. L.L.C.
|
IC tag for use in non-authentic article discrimination system | ||
Patent #
US 20050151616A1
Filed 09/29/2004
|
Current Assignee
Sanyo Electronics Company Limited
|
Sponsoring Entity
Sanyo Electronics Company Limited
|
Base device for use in non-authentic article discrimination system | ||
Patent #
US 20050151648A1
Filed 09/29/2004
|
Current Assignee
Sanyo Electronics Company Limited
|
Sponsoring Entity
Sanyo Electronics Company Limited
|
Method for automatic identification control and management | ||
Patent #
US 20050235156A1
Filed 10/12/2004
|
Current Assignee
Lite-On Technology Corporation
|
Sponsoring Entity
Lite-On Technology Corporation
|
Tag device, luggage tag, and method of manufacturing a tag device | ||
Patent #
US 20050242962A1
Filed 04/29/2004
|
Current Assignee
Battelle Memorial Institute
|
Sponsoring Entity
Battelle Memorial Institute
|
Electron emission display and driving method thereof | ||
Patent #
US 20050243030A1
Filed 04/22/2005
|
Current Assignee
Samsung SDI Company Limited
|
Sponsoring Entity
Samsung SDI Company Limited
|
Object tagged with RFID tag and device and method for processing it | ||
Patent #
US 20050242953A1
Filed 07/07/2005
|
Current Assignee
Toshiba Teli Corporation
|
Sponsoring Entity
Toshiba Teli Corporation
|
Semi-passive radio frequency identification (RFID) tag with active beacon | ||
Patent #
US 20050248438A1
Filed 05/04/2004
|
Current Assignee
Battelle Memorial Institute
|
Sponsoring Entity
Battelle Memorial Institute
|
RFID system utilizing parametric reflective technology | ||
Patent #
US 20050280539A1
Filed 06/21/2005
|
Current Assignee
VUBIQ NETWORKS INC.
|
Sponsoring Entity
VUBIQ NETWORKS INC.
|
RFID system utilizing parametric reflective technology | ||
Patent #
US 20050280504A1
Filed 06/21/2005
|
Current Assignee
VUBIQ NETWORKS INC.
|
Sponsoring Entity
VUBIQ NETWORKS INC.
|
Radio frequency security system, method for a building facility or the like, and apparatus and methods for remotely monitoring the status of fire extinguishers | ||
Patent #
US 20040070506A1
Filed 09/23/2003
|
Current Assignee
Battelle Memorial Institute
|
Sponsoring Entity
Battelle Memorial Institute
|
Method and apparatus to eliminate theft of electronic equipment using existing telephone jack | ||
Patent #
US 20040230823A1
Filed 11/21/2003
|
Current Assignee
Ziad Zakaria
|
Sponsoring Entity
-
|
Low-complexity cryptographic techniques for use with radio frequency identification devices | ||
Patent #
US 20040222878A1
Filed 02/19/2004
|
Current Assignee
Emc IP Holding Company LLC
|
Sponsoring Entity
Emc IP Holding Company LLC
|
System for biometric security using a fob | ||
Patent #
US 8,074,889 B2
Filed 09/06/2007
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
Contact-less tag with signature, and applications thereof | ||
Patent #
US 8,103,872 B2
Filed 12/11/2008
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
System and method for reassociating an account number to another transaction account | ||
Patent #
RE43157E1
Filed 01/31/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM | ||
Patent #
US 20110305335A1
Filed 06/02/2011
|
Current Assignee
Sony Corporation
|
Sponsoring Entity
Sony Corporation
|
RFID architecture in an industrial controller environment | ||
Patent #
US 8,152,053 B2
Filed 03/12/2009
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
RFID mutual authentication verification session | ||
Patent #
US 8,154,405 B2
Filed 10/01/2008
|
Current Assignee
Amtech Systems LLC
|
Sponsoring Entity
Amtech Systems LLC
|
Method and apparatus to provide authentication and privacy with low complexity devices | ||
Patent #
US 8,171,289 B2
Filed 06/11/2007
|
Current Assignee
Symantec Corporation
|
Sponsoring Entity
Symantec Corporation
|
Radio frequency identification (RFID) based authentication methodology using standard and private frequency RFID tags | ||
Patent #
US 8,176,323 B2
Filed 07/11/2008
|
Current Assignee
Daedalus Group LLC
|
Sponsoring Entity
International Business Machines Corporation
|
RADIO FREQUENCY IDENTIFICATION SYSTEM AND RELATED OPERATING METHODS | ||
Patent #
US 20120127976A1
Filed 11/23/2010
|
Current Assignee
Symbol Technologies LLC
|
Sponsoring Entity
Symbol Technologies LLC
|
Public/private dual card system and method | ||
Patent #
RE43460E1
Filed 02/05/2009
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
Radio frequency identification (RFID) based authentication system and methodology | ||
Patent #
US 8,214,651 B2
Filed 07/09/2008
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
Methods of processing a wireless communication signal, wireless communication synchronization methods, and a radio frequency identification device communication method | ||
Patent #
US 8,218,703 B2
Filed 12/03/2009
|
Current Assignee
Battelle Memorial Institute
|
Sponsoring Entity
Battelle Memorial Institute
|
Method and device for agreeing shared key between first communication device and second communication device | ||
Patent #
US 8,261,076 B2
Filed 01/26/2007
|
Current Assignee
Siemens AG
|
Sponsoring Entity
Siemens AG
|
Enhanced controller utilizing RFID technology | ||
Patent #
US 8,260,948 B2
Filed 08/10/2005
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
System and method for enhanced RFID instrument security | ||
Patent #
US 8,264,321 B2
Filed 09/23/2011
|
Current Assignee
Qualcomm FYX Incorporated
|
Sponsoring Entity
Qualcomm FYX Incorporated
|
Iris scan biometrics on a payment device | ||
Patent #
US 8,279,042 B2
Filed 09/20/2007
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
Method and system for auditory recognition biometrics on a FOB | ||
Patent #
US 8,284,025 B2
Filed 09/20/2007
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
Hand geometry biometrics on a payment device | ||
Patent #
US 8,289,136 B2
Filed 09/20/2007
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
Facial scan biometrics on a payment device | ||
Patent #
US 8,294,552 B2
Filed 09/06/2007
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
Controlling data access to and from an RFID device | ||
Patent #
US 8,334,757 B2
Filed 05/09/2007
|
Current Assignee
Koninklijke Philips N.V.
|
Sponsoring Entity
Koninklijke Philips N.V.
|
Secure RFID system and method | ||
Patent #
US 8,344,853 B1
Filed 05/07/2007
|
Current Assignee
Eigent Technologies LLC
|
Sponsoring Entity
Eigent Technologies LLC
|
Security provision in standards-compliant RFID systems | ||
Patent #
US 8,378,786 B2
Filed 02/05/2007
|
Current Assignee
Emc IP Holding Company LLC
|
Sponsoring Entity
EMC Corporation
|
Systems and methods that integrate radio frequency identification (RFID) technology with agent-based control systems | ||
Patent #
US 8,384,544 B2
Filed 06/10/2009
|
Current Assignee
Rockwell Automation Technologies Incorporated
|
Sponsoring Entity
Rockwell Automation Technologies Incorporated
|
Target identification method for a synthetic aperture radar system | ||
Patent #
US 8,405,539 B2
Filed 06/19/2007
|
Current Assignee
Telespazio SPA
|
Sponsoring Entity
Telespazio SPA
|
Method and system for validating a device that uses a dynamic identifier | ||
Patent #
US 8,412,638 B2
Filed 12/23/2008
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
Method for authenticating an entity by a verifier | ||
Patent #
US 8,522,027 B2
Filed 06/16/2009
|
Current Assignee
Orange S.A.
|
Sponsoring Entity
Orange S.A.
|
Biometric registration for facilitating an RF transaction | ||
Patent #
US 8,548,927 B2
Filed 03/26/2004
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
Generation of communication device signatures for use in securing nomadic electronic transactions | ||
Patent #
US 8,553,888 B2
Filed 12/21/2009
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
Biometric authorization of an RF transaction | ||
Patent #
US 8,635,165 B2
Filed 12/17/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
RADIO FREQUENCY IDENTIFICATION (RFID) TAG, INTERROGATOR, AND METHOD FOR AUTHENTICATION BETWEEN THE RFID TAG AND THE INTERROGATOR | ||
Patent #
US 20140023195A1
Filed 07/19/2013
|
Current Assignee
Electronics and Telecommunications Research Institute
|
Sponsoring Entity
Electronics and Telecommunications Research Institute
|
RFID authentication architecture and methods for RFID authentication | ||
Patent #
US 8,681,987 B2
Filed 01/30/2009
|
Current Assignee
Smartrac Technology Fletcher Inc.
|
Sponsoring Entity
Neology Incorporated
|
System and method for enhanced RFID instrument security | ||
Patent #
US 8,698,595 B2
Filed 08/07/2012
|
Current Assignee
Qualcomm FYX Incorporated
|
Sponsoring Entity
Qualcomm FYX Incorporated
|
Wireless device authentication and security key management | ||
Patent #
US 8,738,907 B2
Filed 08/02/2007
|
Current Assignee
Motorola Solutions Inc.
|
Sponsoring Entity
Motorola Solutions Inc.
|
Communication device, communication method, and communication system | ||
Patent #
US 8,804,959 B2
Filed 06/02/2011
|
Current Assignee
Sony Corporation
|
Sponsoring Entity
Sony Corporation
|
System, method, and apparatus for allowing a service provider system to authenticate that a credential is from a proximate device | ||
Patent #
US 8,806,616 B2
Filed 09/14/2012
|
Current Assignee
NXP B.V.
|
Sponsoring Entity
Broadcom Corporation
|
Limiting access to account information during a radio frequency transaction | ||
Patent #
US 8,818,907 B2
Filed 12/14/2004
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Xatra Fund MX LLC
|
Security feature RFID card | ||
Patent #
US 8,820,639 B2
Filed 11/02/2007
|
Current Assignee
Assa Abloy AB
|
Sponsoring Entity
Assa Abloy AB
|
Securing a transaction between a transponder and a reader | ||
Patent #
US 8,872,619 B2
Filed 05/03/2007
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
American Express Travel Related Services Company Inc.
|
System and method for operating an RFID system with head tracking | ||
Patent #
US 8,890,657 B2
Filed 10/30/2009
|
Current Assignee
Symbol Technologies LLC
|
Sponsoring Entity
Symbol Technologies LLC
|
Method and apparatus to provide authentication and privacy with low complexity devices | ||
Patent #
US 8,908,866 B2
Filed 04/13/2012
|
Current Assignee
Symantec Corporation
|
Sponsoring Entity
Symantec Corporation
|
Radio frequency identification system and related operating methods | ||
Patent #
US 8,953,570 B2
Filed 11/23/2010
|
Current Assignee
Symbol Technologies LLC
|
Sponsoring Entity
Symbol Technologies LLC
|
RF transaction system and method for storing user personal data | ||
Patent #
US 9,024,719 B1
Filed 10/15/2004
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Chartoleaux KG LLC
|
Processing of communication device signatures for use in securing nomadic electronic transactions | ||
Patent #
US 9,037,859 B2
Filed 08/02/2013
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
RF transaction device | ||
Patent #
RE45615E1
Filed 10/10/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Chartoleaux KG LLC
|
DNA sample data in a transponder transaction | ||
Patent #
US 9,129,453 B2
Filed 10/31/2008
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Chartoleaux KG LLC
|
Validation method and system for use in securing nomadic electronic transactions | ||
Patent #
US 9,231,928 B2
Filed 12/18/2008
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
RFID authentication architecture and methods for RFID authentication | ||
Patent #
US 9,231,947 B2
Filed 03/25/2014
|
Current Assignee
Smartrac Technology Fletcher Inc.
|
Sponsoring Entity
Neology Incorporated
|
System and method for authentication via a proximate device | ||
Patent #
US 9,264,426 B2
Filed 09/14/2012
|
Current Assignee
NXP B.V.
|
Sponsoring Entity
NXP B.V.
|
System and method for enhanced RFID instrument security | ||
Patent #
US 9,262,655 B2
Filed 02/19/2014
|
Current Assignee
Qualcomm FYX Incorporated
|
Sponsoring Entity
Qualcomm FYX Incorporated
|
Contact-less tag with signature, and applications thereof | ||
Patent #
US 9,305,282 B2
Filed 12/11/2008
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
Hand geometry biometrics on a payment device | ||
Patent #
US 9,336,634 B2
Filed 09/21/2012
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Chartoleaux KG LLC
|
Reload protocol at a transaction processing entity | ||
Patent #
US 9,454,752 B2
Filed 12/13/2002
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Chartoleaux KG LLC
|
Verification system and method for a collectible object | ||
Patent #
US 9,575,724 B1
Filed 12/13/2011
|
Current Assignee
Anthony C. Liberatori Jr
|
Sponsoring Entity
Anthony C. Liberatori Jr
|
Virtual private network (VPN) tunneling in a user equipment (UE) brokered by a radio frequency identity (RFID) chip communicatively coupled to the user equipment | ||
Patent #
US 9,591,434 B1
Filed 04/27/2015
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
RFID mutual authentication verification session | ||
Patent #
RE46447E1
Filed 04/03/2014
|
Current Assignee
Amtech Systems LLC
|
Sponsoring Entity
Amtech Systems LLC
|
Digest of biographical information for an electronic device with static and dynamic portions | ||
Patent #
US 9,712,999 B1
Filed 03/14/2016
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
Prevention of inductive coupling between components of a mobile communication device | ||
Patent #
US 9,763,033 B1
Filed 07/08/2016
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
RFID authentication architecture and methods for RFID authentication | ||
Patent #
US 9,843,580 B2
Filed 01/04/2016
|
Current Assignee
Smartrac Technology Fletcher Inc.
|
Sponsoring Entity
Smartrac Technology Fletcher Inc.
|
RF payment via a mobile device | ||
Patent #
US 9,881,294 B2
Filed 01/07/2009
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Liberty Peak Ventures LLC
|
Securing a transaction between a transponder and a reader | ||
Patent #
US 9,886,692 B2
Filed 10/27/2014
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Liberty Peak Ventures LLC
|
Tag-handle-based authentication of RFID readers | ||
Patent #
US 9,916,483 B1
Filed 08/18/2017
|
Current Assignee
Impinj Incorporated
|
Sponsoring Entity
Impinj Incorporated
|
Network-enabled RFID tag endorsement | ||
Patent #
US 9,928,390 B1
Filed 06/23/2016
|
Current Assignee
Impinj Incorporated
|
Sponsoring Entity
Impinj Incorporated
|
Enhanced RFID tag authentication | ||
Patent #
US 9,940,490 B1
Filed 12/13/2013
|
Current Assignee
Impinj Incorporated
|
Sponsoring Entity
Impinj Incorporated
|
Method and system for validating a device that uses a dynamic identifier | ||
Patent #
US 9,971,986 B2
Filed 03/28/2013
|
Current Assignee
BCE Incorporated
|
Sponsoring Entity
BCE Incorporated
|
System and method for object entry and egress control in a predefined area | ||
Patent #
US 10,002,512 B2
Filed 01/30/2014
|
Current Assignee
Le-Jun Yin
|
Sponsoring Entity
Le-Jun Yin
|
Enhanced RFID tag authentication | ||
Patent #
US 10,121,033 B1
Filed 03/05/2018
|
Current Assignee
Impinj Incorporated
|
Sponsoring Entity
Impinj Incorporated
|
RFID authentication architecture and methods for RFID authentication | ||
Patent #
US 10,341,341 B2
Filed 12/06/2017
|
Current Assignee
Smartrac Technology Fletcher Inc.
|
Sponsoring Entity
Smartrac Technology Fletcher Inc.
|
Method of addressing messages, method of establishing wireless communications, and communications system | ||
Patent #
US 6,307,848 B1
Filed 01/31/2001
|
Current Assignee
Round Rock Research LLC
|
Sponsoring Entity
Micron Technology Inc.
|
Method and apparatus for improving the interrogation range of an RF tag | ||
Patent #
US 6,236,315 B1
Filed 10/19/1999
|
Current Assignee
LGS Innovations LLC
|
Sponsoring Entity
Lucent Technologies Inc.
|
Encryption for modulated backscatter systems | ||
Patent #
US 6,130,623 A
Filed 12/31/1996
|
Current Assignee
Lucent Technologies Inc.
|
Sponsoring Entity
Lucent Technologies Inc.
|
RFID tag having multiple transceivers | ||
Patent #
US 6,726,099 B2
Filed 09/05/2002
|
Current Assignee
Honeywell International Inc.
|
Sponsoring Entity
Honeywell International Inc.
|
Enhanced uplink modulated backscatter system | ||
Patent #
US 5,940,006 A
Filed 12/12/1995
|
Current Assignee
ATT Inc.
|
Sponsoring Entity
-
|
System for short range wireless data communication to inexpensive endpoints | ||
Patent #
US 6,177,861 B1
Filed 07/17/1998
|
Current Assignee
Alcatel-Lucent USA Inc.
|
Sponsoring Entity
Alcatel-Lucent USA Inc.
|
Full duplex modulated backscatter system | ||
Patent #
US 5,649,296 A
Filed 06/19/1995
|
Current Assignee
Lucent Technologies Inc.
|
Sponsoring Entity
Lucent Technologies Inc.
|
System and method for payment using radio frequency identification in contact and contactless transactions | ||
Patent #
US 20040049451A1
Filed 07/09/2002
|
Current Assignee
Liberty Peak Ventures LLC
|
Sponsoring Entity
Liberty Peak Ventures LLC
|
Method and configuration for mutual authentication of two data processing units | ||
Patent #
US 20030018893A1
Filed 08/08/2002
|
Current Assignee
Infineon Technologies AG
|
Sponsoring Entity
Infineon Technologies AG
|
Method and system for discouraging unauthorized copying of a computer program | ||
Patent #
US 20030028787A1
Filed 08/06/2001
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Technology Licensing LLC
|
Radio frequency tag circuit and method for reading multiple tags | ||
Patent #
US 20030179078A1
Filed 08/30/2002
|
Current Assignee
Holtek Semiconductor Incorporated
|
Sponsoring Entity
Holtek Semiconductor Incorporated
|
RFID tag employing hollowed monopole antenna | ||
Patent #
US 6,366,260 B1
Filed 12/22/1999
|
Current Assignee
Intermec IP Corporation
|
Sponsoring Entity
Intermec IP Corporation
|
Electronic device for secure authentication of objects such as computers in a data network | ||
Patent #
US 20020129246A1
Filed 01/28/2002
|
Current Assignee
Emc IP Holding Company LLC
|
Sponsoring Entity
Emc IP Holding Company LLC
|
Method for resolving signal collisions between multiple RFID transponders in a field | ||
Patent #
US 6,265,962 B1
Filed 06/29/2000
|
Current Assignee
Round Rock Research LLC
|
Sponsoring Entity
Micron Technology Inc.
|
Electronic identification, control, and security system and method for consumer electronics and the like | ||
Patent #
US 6,317,028 B1
Filed 02/03/1999
|
Current Assignee
HINES ASSOCIATES INC.
|
Sponsoring Entity
ELECTRONIC SECURITY AND IDENTIFICATION LLC
|
Transponder for remote keyless entry systems | ||
Patent #
US 6,323,566 B1
Filed 10/10/1996
|
Current Assignee
Texas Instruments Deutschland Gesellschaft Mit BeschrNkter Haftung
|
Sponsoring Entity
Texas Instruments Deutschland Gesellschaft Mit BeschrNkter Haftung
|
Method for resolving signals collisions between multiple RFID transponders in a field | ||
Patent #
US 6,091,319 A
Filed 09/13/1999
|
Current Assignee
Round Rock Research LLC
|
Sponsoring Entity
Micron Technology Inc.
|
Anticollision protocol for reading multiple RFID tags | ||
Patent #
US 5,883,582 A
Filed 02/07/1997
|
Current Assignee
CHECKPOINT SYSTEMS INC., Mitsubishi Materials Corporation
|
Sponsoring Entity
CHECKPOINT SYSTEMS INC.
|
Method for communicating with RF transponders | ||
Patent #
US 5,995,019 A
Filed 07/06/1998
|
Current Assignee
Intermec IP Corporation
|
Sponsoring Entity
Intermec IP Corporation
|
Method for resolving signal collisions between multiple RFID transponders in a field | ||
Patent #
US 5,986,570 A
Filed 09/03/1997
|
Current Assignee
Round Rock Research LLC
|
Sponsoring Entity
Micron Technology Inc.
|
Method of generating secret identification numbers | ||
Patent #
US 5,757,923 A
Filed 04/19/1996
|
Current Assignee
Lear Corporation EEDS and Interiors Incorporated
|
Sponsoring Entity
UT Automotive Dearborn Inc.
|
Method of grouping RF transponders | ||
Patent #
US 5,777,561 A
Filed 09/30/1996
|
Current Assignee
Intermec IP Corporation
|
Sponsoring Entity
Unova Incorporated
|
Integrated electronic tag reader and wireless communication link | ||
Patent #
US 5,850,187 A
Filed 03/27/1996
|
Current Assignee
Intermec IP Corporation
|
Sponsoring Entity
Intermec IP Corporation
|
Power-efficient technique for multiple tag discrimination | ||
Patent #
US 5,521,601 A
Filed 04/21/1995
|
Current Assignee
Intermec IP Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
System for storage and communication of information | ||
Patent #
US 5,530,702 A
Filed 05/31/1994
|
Current Assignee
Mobile Technics LLC
|
Sponsoring Entity
Ludwig Kipp
|
Multiple item radio frequency tag identification protocol | ||
Patent #
US 5,550,547 A
Filed 09/12/1994
|
Current Assignee
Intermec IP Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
Information transmission system | ||
Patent #
US 4,352,183 A
Filed 10/29/1980
|
Current Assignee
US Philips Corporation
|
Sponsoring Entity
US Philips Corporation
|
Multichannel homodyne receiver | ||
Patent #
US 4,360,810 A
Filed 01/19/1981
|
Current Assignee
United States Department of Energy
|
Sponsoring Entity
United States Department of Energy
|
Interrogation, and detection system | ||
Patent #
US 4,075,632 A
Filed 05/24/1976
|
Current Assignee
AMTECH CORPORATION 536 PAUL PLACE WHITE ROCK NEW MEXICO A CORP OF NEW MEXICO
|
Sponsoring Entity
AMTECH CORPORATION 536 PAUL PLACE WHITE ROCK NEW MEXICO A CORP OF NEW MEXICO
|
46 Claims
- 1. A method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information, the method comprising:
sending, from the reader, a message to the tag;
the tag, in response to the message, generating a challenge value and sending the challenge value to the reader;
in any order;
the reader performing a mathematical operation on the challenge value based upon a key value, stored in the reader to generate a challenge reply and sending the challenge reply to the tag; and
prior to receiving the challenge reply from the reader, the tag independently computing a challenge response based on an identical key value and mathematical operation stored in the tag;
the tag comparing the challenge response computed by the tag with the challenge reply sent by the reader; and
the tag authenticating the reader if the challenge response matches the challenge reply. - View Dependent Claims (2, 3, 4, 5, 6, 7)
- 8. A method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information, the method comprising:
sending, from the tag, a message to the reader;
the reader, in response to the message, generating a challenge value and sending the challenge value to the tag;
in any order;
the tag performing a mathematical operation on the challenge value based upon a key value to generate a challenge reply and sending the challenge reply to the reader; and
prior to receiving the challenge reply from the tag, the reader independently computing a challenge response based on the key value and mathematical operation;
the reader comparing the challenge response computed by the reader with the challenge reply sent by the tag; and
the reader authenticating the tag if the challenge response matches the challenge reply. - View Dependent Claims (9, 10, 11, 12, 13, 14)
- 15. An RFID communications system comprising:
an RF tag having a memory configured to store information; and
a reader configured to send a message to the tag;
the tag being configured to, in response to the message, generate a challenge value and send the challenge value to the reader;
the reader being configured to perform a mathematical operation on the challenge value based upon a key value to generate a challenge reply and send the challenge reply to the tag;
the tag being further configured to independently compute a challenge response based on the key value and mathematical operation prior to receiving the challenge reply from the reader, to compare the challenge response computed by the tag with the challenge reply sent by the reader, and to authenticate the reader if the challenge response matches the challenge reply.- View Dependent Claims (16, 17, 18, 19, 20, 21)
- 22. An RFID communications system comprising:
an RF tag having a memory configured to store information; and
a reader configured for RF communication with the tag, the tag being configured to send a message to the reader;
the reader being configured to, in response to the message, generate a challenge value and send the challenge value to the tag;
the tag being configured to perform a mathematical operation on the challenge value based upon a key value to generate a challenge reply and send the challenge reply to the reader;
the reader being further configured to independently compute a challenge response based on the key value and mathematical operation prior to receiving the challenge reply from the tag, to compare the challenge response computed by the reader with the challenge reply sent by the tag, and to authenticate the tag if the challenge response matches the challenge reply.- View Dependent Claims (23, 24, 25, 26, 27, 28)
- 29. A method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information, the method comprising the following steps, in order:
sending, from the tag, a message to the reader;
the reader, in response to the message, generating a challenge value, independently computing a challenge response based on the key value and mathematical operation, and sending the challenge value to the tag;
the tag performing a mathematical operation on the challenge value based upon a key value to generate a challenge reply and sending the challenge reply to the reader;
the reader directly comparing the challenge response computed by the reader with the challenge reply sent by the tag, without first performing a mathematical operation on the challenge reply; and
the reader authenticating the tag if the challenge response matches the challenge reply. - View Dependent Claims (30, 31, 32, 33, 34, 35)
- 36. An RFID reader for use with an RF tag having a memory configured to store information and configured to send an authentication request to the reader, the reader being configured to, in response to the request:
generate a challenge value and send the challenge value to the tag, and wait for the tag to perform a mathematical operation on the challenge value based upon a key value to generate a challenge reply and to send the challenge reply to the reader;
independently compute a challenge response based on the key value and mathematical operation prior to receiving the challenge reply from the tag;
compare the challenge response computed by the reader with the challenge reply sent by the tag without performing a mathematical operation on the challenge reply sent by the tag prior to the comparing; and
authenticate the tag if the challenge response matches the challenge reply. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43)
- 44. A method of securing communications in an RFID system including a reader and an RF tag, the method comprising the following steps:
sending, from the reader, a request to the tag;
the tag, in response to the request, generating and sending a challenge value to the reader;
the reader performing a mathematical operation on the challenge value using a reader private key value to generate an encrypted challenge reply and sending the encrypted challenge reply to the tag;
the tag performing a mathematical operation on the encrypted challenge reply using a reader public key value to generate a decrypted response;
the tag comparing the decrypted response with the challenge value; and
the tag authenticating the reader if the decrypted response matches the challenge value.
- 45. A method of securing communications in an RFID system including a reader and an RF tag, the method comprising the following steps:
the reader generating a non-encrypted challenge value;
the reader sending a request, including the challenge value, to the tag;
the tag, in response to the request, performing a mathematical operation on the challenge value using a tag private key value to generate an encrypted challenge reply and sending the encrypted challenge reply to the reader;
the reader performing a mathematical operation on the encrypted challenge reply using a tag public key value to generate a decrypted response;
the reader comparing the decrypted response with the challenge value; and
the reader authenticating the tag if the decrypted response matches the challenge value.
- 46. A method of securing communications in an RFID system including a reader and an RF tag, the method comprising the following steps:
the reader generating a non-encrypted first challenge value;
the reader sending a request, including the first challenge value, to the tag;
the tag, in response to the request, performing a mathematical operation on the first challenge value using a tag private key value to generate an encrypted first challenge reply;
the tag generating a non-encrypted second challenge value, and sending the first challenge reply and the second challenge value to the reader;
the reader performing a mathematical operation on the first challenge reply using a tag public key value to generate a decrypted first response;
the reader comparing the first response with the first challenge value and authenticating the tag if the first response matches the first challenge value;
the reader performing a mathematical operation on the second challenge value using a reader private key value to generate an encrypted second challenge reply and sending the second challenge reply to the tag;
the tag performing a mathematical operation on the second challenge reply using a reader public key value to generate a decrypted second response; and
the tag comparing the second response with the second challenge value and authenticating the reader if the second response matches the second challenge value.
1 Specification
The invention relates to a remote communication system. More particularly, the invention relates to a radio frequency (RF) identification system and methods for secure communications between a RFID reader and RFID tags.
Remote communication utilizing wireless equipment typically relies on radio frequency (RF) technology, which is employed in many industries. One application of RF technology is in locating, identifying, and tracking objects, such as animals, inventory, and vehicles.
RF identification (RFID) tag systems have been developed to identify, monitor or control remote objects. As shown in
In some applications, the transceiver and antenna 12 are components of an interrogator (or reader) 18, which can be configured either as a hand-held or a fixed-mount device. The interrogator 18 emits the radio signals 20 in range from one inch to one hundred feet or more, depending upon its power output and the radio frequency used. When an RF tag 16 passes through the electromagnetic radio waves 20, the tag detects the signal 20 and is activated. Data encoded in the tag 16 is then transmitted by a modulated data signal 22 through an antenna 24 to the interrogator 18 for subsequent processing.
An advantage of RFID systems is the non-contact, non-line-of-sight capability of the technology. Tags can be read through a variety of substances such as snow, fog, ice, paint, dirt, and other visually and environmentally challenging conditions where bar codes or other optically-read technologies would be useless. RF tags can also be read at remarkable speeds, in most cases responding in less than one hundred milliseconds.
There are three main categories of RFID tag systems. These are systems that employ beam-powered passive tags, battery-powered semi-passive tags, and active tags. Each operates in fundamentally different ways. The invention described below in the Detailed Description can be embodied in any of these types of systems.
The beam-powered RFID tag is often referred to as a passive device because it derives the energy needed for its operation from the radio frequency energy beamed at it. The tag rectifies the field and changes the reflective characteristics of the tag itself, creating a change in reflectivity that is seen at the interrogator. A battery-powered semi-passive RFID tag operates in a similar fashion, modulating its RF cross-section in order to change its reflectivity that is seen at the interrogator to develop a communication link. Here, the battery is the only source of the tag'"'"'s operational power. Finally, in the active RFID tag, both the tag and reader have transceivers to communicate and are powered by a battery.
A typical RF tag system 10 will contain at least one tag 16 and one interrogator 18. The range of communication for such tags varies according to the transmission power of the interrogator 18 and the tag 16. Battery-powered tags operating at 2,450 MHz have traditionally been limited to less than ten meters in range. However, devices with sufficient power can reach in excess of 100 meters in range, depending on the frequency and environmental characteristics.
Conventional RF tag systems utilize continuous wave backscatter to communicate data from the tag 16 to the interrogator 18. More specifically, the interrogator 18 transmits a continuous-wave radio signal to the tag 16, which modulates the signal 20 using modulated backscattering wherein the electrical characteristics of the antenna 24 are altered by a modulating signal from the tag that reflects a modulated signal 22 back to the interrogator 18. The modulated signal 22 is encoded with information from the tag 16. The interrogator 18 then demodulates the modulated signal 22 and decodes the information.
Conventional continuous wave backscatter RF tag systems utilizing passive (no battery) RF tags require adequate power from the signal 20 to power the internal circuitry in the tag 16 used to modulate the signal back to the interrogator 18. While this is successful for tags that are located in close proximity to an interrogator, for example less than three meters, this may be insufficient range for some applications, for example greater than 100 meters.
A problem in RFID systems is in authentication and secure communications between the reader and RF tags in the field of view of the reader.
One aspect of the invention provides a method and apparatus for authenticating a reader or tags over a public, open channel. Another aspect of the invention provides a method and apparatus that is more robust against spoofing and other illicit access attempts than password-based methods.
The invention provides a method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information, the method comprising: sending, from the reader, a message to the tag; the tag, in response to the message, generating a challenge value and sending the challenge value to the reader; in any order: the reader performing a mathematical operation on the challenge value based upon a key value to generate a challenge reply and sending the challenge reply to the tag and the tag independently computing a challenge response based on the key value and mathematical operation; the tag comparing the challenge response computed by the tag with the challenge reply send by the reader; and the tag authenticating the reader if the challenge response matches the challenge reply.
Another aspect of the invention provides a method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information, the method comprising: sending, from the tag, a message to the reader; the reader, in response to the message, generating a challenge value and sending the challenge value to the tag; in any order: the tag performing a mathematical operation on the challenge value based upon a key value to generate a challenge reply and sending the challenge reply to the reader and the reader independently computing a challenge response based on the key value and mathematical operation; the reader comparing the challenge response computed by the reader with the challenge reply sent by the tag; and the reader authenticating the tag if the challenge response matches the challenge reply.
An RFID communications system comprising: an RF tag having a memory configured to store information; and a reader configured to send a message to the tag; the tag being configured to, in response to the message, generate a challenge value and send the challenge value to the reader; the reader being configured to perform a mathematical operation on the challenge value based upon a key value to generate a challenge reply and send the challenge reply to the tag; the tag being further configured to independently compute a challenge response based on the key value and mathematical operation, to compare the challenge response computed by the tag with the challenge reply sent by the reader, and to authenticate the reader if the challenge response matches the challenge reply.
An RFID communications system comprising: an RF tag having a memory configured to store information; and a reader configured for RF communication with the tag, the tag being configured to send a message to the reader; the reader being configured to, in response to the message, generate a challenge value and send the challenge value to the tag; the tag being configured to perform a mathematical operation on the challenge value based upon a key value to generate a challenge reply and send the challenge reply to the reader; the reader being further configured to independently compute a challenge response based on the key value and mathematical operation, to compare the challenge response computed by the reader with the challenge reply sent by the tag, and to authenticate the tag if the challenge response matches the challenge reply.
A method of securing communications in an RFID system including a reader and an RF tag having a memory configured to store information, the method comprising the following steps, in order: sending, from the tag, a message to the reader; the reader, in response to the message, generating a challenge value and sending the challenge value to the tag; the reader independently computing a challenge response based on the key value and mathematical operation; the tag performing a mathematical operation on the challenge value based upon a key value to generate a challenge reply and sending the challenge reply to the reader; the reader directly comparing the challenge response computed by the reader with the challenge reply sent by the tag, without a need to first perform a mathematical operation on the challenge reply; and the reader authenticating the tag if the challenge response matches the challenge reply.
An RFID communications system comprising: an RF tag having a memory configured to store information; and a reader configured for RF communication with the tag, the tag being configured to send a message to the reader, the reader being further configured to, in response to the message: generate a challenge value and send the challenge value to the tag, the tag being further configured to perform a mathematical operation on the challenge value based upon a key value to generate a challenge reply and send the challenge reply to the reader; independently compute a challenge response based on the key value and mathematical operation prior to receiving the challenge reply from the tag; directly compare the challenge response computed by the reader with the challenge reply sent by the tag without a need to first perform a mathematical operation on the challenge reply sent by the tag; and authenticate the tag if the challenge response matches the challenge reply.
Preferred embodiments of the invention are described below with reference to the following accompanying drawings.
Attention is directed to the following commonly assigned applications, which are incorporated herein by reference: U.S. patent application Ser. No. 10/263,826 entitled “Radio Frequency Identification Device Communications Systems, Wireless Communication Devices, Wireless Communication Systems, Backscatter Communication Methods, A Radio Frequency Identification Device and A Radio Frequency Identification Device Communication Method” by inventors Mike A. Hughes and Richard M. Pratt; U.S. patent application Ser. No. 10/263,809, entitled “Method of Simultaneously Reading Multiple Radio Frequency Tags, RF Tag, and RF Reader”, by inventors Emre Ertin, Richard M. Pratt, Mike A. Hughes, Kevin L. Priddy, and Wayne M. Lechelt; U.S. patent application Ser. No. 10/263,873, entitled “RFID System and Method Including Tag ID Compression”, by inventors Mike A. Hughes and Richard M. Pratt; U.S. patent application Ser. No. 10/264,078, entitled “System and Method to Identify Multiple RFID Tags”, by inventors Mike A. Hughes and Richard M. Pratt; U.S. patent application Ser. No. 10/263,940, entitled “Wireless Communication Devices, Radio Frequency Identification Devices, Backscatter Communication Device Wake-Up Methods, Communication Device Wake-Up Methods and A Radio Frequency Identification Device Wake-Up Method”, by inventors Richard Pratt and Mike Hughes; U.S. patent application Ser. No. 10/263,997, entitled “Wireless Communication Systems, Radio Frequency Identification Devices, Methods of Enhancing a Communications Range of a Radio Frequency Identification Device, and Wireless Communication Methods”, by inventors Richard Pratt and Steven B. Thompson; U.S. patent application Ser. No. 10/263,670, entitled “Wireless Communications Devices, Methods of Processing a Wireless Communication Signal, Wireless Communication Synchronization Methods and a Radio Frequency Identification Device Communication Method”, by inventors Richard M. Pratt and Steven B. Thompson; U.S. patent application Ser. No. 10/263,656, entitled “Wireless Communications Systems, Radio Frequency Identification Devices, Wireless Communications Methods, and Radio Frequency Identification Device Communications Methods”, by inventors Richard Pratt and Steven B. Thompson; U.S. patent application Ser. No. 09/589,001, filed Jun. 6, 2000, entitled “Remote Communication System and Method”, by inventors R. W. Gilbert, G. A. Anderson, K. D. Steele, and C. L. Carrender; U.S. patent application Ser. No. 09/802,408, filed Mar. 9, 2001, entitled “Multi-Level RF Identification System”, now U.S. Pat. No. 6,765,476; by inventors R. W. Gilbert, G. A. Anderson, and K. D. Steele; U.S. patent application Ser. No. 09/833,465, filed Apr. 11, 2001, entitled “System and Method for Controlling Remote Device”, by inventors C. L. Carrender, R. W. Gilbert, J. W. Scott, and D. Clark; U.S. patent application Ser. No. 09/588,997, filed Jun. 6, 2000, entitled “Phase Modulation in RF Tag”, by inventors R. W. Gilbert and C. L. Carrender; U.S. patent application Ser. No. 09/589,000, filed Jun. 6, 2000, entitled “Multi-Frequency Communication System and Method”, by inventors R. W. Gilbert and C. L. Carrender, now U.S. Pat. No. 6,745,008; U.S. patent application Ser. No. 09/588,998, filed Jun. 6, 2000, entitled “Distance/Ranging by Determination of RF Phase Delta”, by inventor C. L. Carrender; U.S. patent application Ser. No. 09/797,539, filed Feb. 28, 2001, entitled “Antenna Matching Circuit”, by inventor C. L. Carrender, now U.S. Pat. No. 6,738,025; U.S. patent application Ser. No. 09/833,391, filed Apr. 11, 2001, entitled “Frequency Hopping RFID Reader”, by inventor C. L. Carrender.
As shown in
In the embodiment shown in
In
It will be appreciated that the depiction of the RF tag 44 in
Similarly, the internal structures of the interrogator 32 are not shown in FIG. 2. For example, the interrogator 32 can be the receiver described in U.S. Pat. No. 4,360,810 to Landt, which is incorporated herein by reference, modified as described below.
In the illustrated embodiment, the reader 32 includes a processor 54, which in turn includes an arithmetic logic unit (ALU) 56 and a random number generator 58. The processor 54 further includes a memory 64; alternatively, the reader 32 includes a memory separate from the processor 54. The memory 64 stores a secret key value 68, the use of which will be described in greater detail below. The memory 50 of each tag 44 also stores a secret key value 66 which, in the illustrated embodiment, is the same value as the key value 68.
The processor 54 includes other features typically included in processors of the type typically employed in RFID readers. In one embodiment, the random number generator 58 actually generates pseudo random numbers; i.e., the numbers generated may follow a pattern that could be recreated. While the random number generator 58 is shown as being separate from the ALU 56, in one embodiment, the random number generator 58 is defined in part by the ALU 56. Similarly, each of the RF tags 44 is shown as including an arithmetic logic unit (ALU) 60 and a random number generator 62. Depending on whether the tags 44 or the reader 32 will be the authenticator (as will be described below), the random number generator may be omitted from either the RF tags 44 or from the reader 32.
Aspects of the invention described in connection with
All participants in the authentication perform long, logical mathematical operations. More particularly, in step S1, the Requestor device requesting access (can be either a tag or the reader) sends a message to the Authenticator. In one embodiment, the Requestor is a tag 44 and the Authenticator is the reader 32. In another embodiment, the Requestor is the reader 32 and the Authenticator is a tag 44.
In step S2, the Authenticator generates an “Access Challenge” number. More particularly, in one embodiment, the “Access Challenge” number is a pseudo random number generated by the random number generator 58 or 62. Still more particularly, in one embodiment, the “Access Challenge” value is a long binary value, which is randomly generated. The length can be 128 bits, 256 bits, 512 bits, or any desired value selected depending on the desired security level versus cost and processing time.
In step S3, the Authenticator sends the “Access Challenge” number or value to the Requestor.
In step S4, the Requestor performs a long mathematical operation (or series of mathematical operations) on the “Access Challenge” number based upon the secret key value 66 or 68 (see
In step S5, the Requestor replies to the Authenticator with a “Challenge Response”.
In step S6, the Authenticator independently computes its own “Challenge Response” by performing the same mathematical operation of step S4 that the Requestor performed and by using the same key value that the Requestor performed. Step S6 could be performed after step S1 and before step S2, simultaneously with step S2, or at any time between step S1 and step S7.
In step S7, the Authenticator compares the received “Challenge Response” from the Requestor matches the value computed by the Authenticator. If not, the Authenticator denies access in step S8. If so, the Authenticator grants access in step S9.
In step S10, the Authenticator sends a message to the Requestor informing the Requestor that access is granted. After step S10, normal communications occur in step S11, including transmission of information stored in the Authenticator to the Requestor (e.g., identification information, account information, financial information, etc.).
This is similar to the approach used in prior hardware based “dongle” designs, which were used in the past to prevent software piracy, except in a completely different field of use and without requiring a traditional dongle.
The advantages of this approach include:
- (1) The “Access Challenge” number is a generally random number;
- (2) The response to the Access Challenge is dependent upon the Challenge value, but is convoluted to obscure the key value.
- (3) Multiple key values are possible, which can uniquely identify the user.
- (4) The length of the keys and challenge values can be configured to the security requirement at hand. Tradeoffs can be made between level of security and system cost. Greater security requires longer keys, longer messages, and more processor power.
- (5) The approach of
FIG. 3 is used to generate encryption values for a data stream, in an alternative embodiment. The challenge response is not transmitted, but is used to encrypt the data stream.
This approach can be implemented in a passive or semi-passive RFID application to provide a level of security and/or data encryption not presently available. The passive or semi-passive RFID application will require that the Authenticator initiate all communication processes with the Requestors. Various embodiments of the invention could be employed in security and inventory management applications.
In another embodiment, public key encryption is used. Reader authentication occurs as follows. The reader requests to read or write tag data. The tag responds with a challenge value (random number). The reader encrypts the challenge value using its private key. The reader sends the encrypted challenge response to the tag. The tag uses the reader public key to decrypt the challenge response. The tag compares the results to the original challenge value and, if there is a match, the reader is authenticated.
The process for a tag authentication is as follows. The reader issues a request to a tag including a non-encrypted challenge value. The tag encrypts the challenge value using its private key, creating a challenge response. The tag sends the challenge response to the reader (no key is sent). The reader decrypts the challenge response using the known tag'"'"'s public key. If the reader-computed result matches the original challenge value, the tag is authenticated.
In another embodiment related to those just described, both a tag and a reader function to authenticate the other. For example, a reader sends a non-encrypted first challenge value to a tag. The tag encrypts the first challenge value using a tag private key and sends it to the reader, as a first response, along with a non-encrypted second challenge value. The reader decrypts the first response using a tag public key, and compares the result with the non-encrypted first challenge value. If the comparison is valid, then the tag is determined to be authentic. The reader then encrypts the second challenge value using a reader private key and sends it to the tag as a second response. The tag then decrypts the second response using a reader public key, and compares the result with the non-encrypted second challenge value. If the comparison in valid, then the reader is also determined to be authentic. The tag and the reader may now continue with the exchange of data or commands.
In the embodiments just described above, it is assumed that both the reader and the tag(s) know the public key or keys of the other, in advance of the authentication process. This is a valid assumption if both (all) belong to the same application. In addition, multiple keys (public and private) may be used to realize corresponding level of security. Generally, the longer (i.e., more complex) the key length, the greater the level of security within the exchange. In the example just described, the non-encrypted first and second challenge values may be the same; responses would be different due to different private keys. Other embodiments using public and private keys are also possible.
Inventory management incorporates a wide variety of situations where RF tags can be used. These situations include the simple inventory/locating task of critical or high value items in storage, transport, or final use locations. Integrating authentication capability into the tags as described above would greatly increase the security of data contained within the tag and the item to which it is attached.
Any design of RF tag can be used for security purposes. The addition of authentication capability described above provides an additional mechanism against spoofing. The security needs are many, with potential theft being high on the list. The traditional means of detecting when a theft has occurred is to track inventory. Items can be identified as they are removed from a monitored area or when subsequent inventories are made of the storage location.
Thus, methods and apparatus for authenticating reader or tags over a public, open channel have been provided. A system has been provided that is more robust against spoofing and other illicit access attempts than password-based methods.
Implementation requires minor changes to existing designs and is, for some embodiments, a matter of implementation in the RF tags'"'"' and readers'"'"' microprocessors.
In compliance with the statute, the invention has been described in language more or less specific as to structural and methodical features. It is to be understood, however, that the invention is not limited to the specific features shown and described, since the means herein disclosed comprise preferred forms of putting the invention into effect. The invention is, therefore, claimed in any of its forms or modifications within the proper scope of the appended claims appropriately interpreted in accordance with the doctrine of equivalents.