Method to address security and privacy issue of the use of RFID systems to track consumer products
First Claim
Patent Images
1. A method for secure electronic labeling, the method comprising:
- writing an entry to a memory as a triple having a type, a length, and a value, the memory being part of a machine-readable identification device that is part of an electronic label, wherein the type identifies a type of write access control rule that is to control overwriting the value written to the entry;
selecting a first write access control rule from a plurality of write access control rules based on the type written in the entry in response to a request to write a rewrite value to the entry; and
performing a write access to the entry according to the first write access control rule in response to the request to write the rewrite value to the entry.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system, apparatus, and computer program product for using radio-frequency identification (RFID) technology to store product information in tags attached to items of merchandise is disclosed. The RFID tagging scheme of the present invention prevents tampering with stored information, global tracking of customers and their purchased items, and pricing mistakes made at the point of sale.
-
Citations
57 Claims
-
1. A method for secure electronic labeling, the method comprising:
-
writing an entry to a memory as a triple having a type, a length, and a value, the memory being part of a machine-readable identification device that is part of an electronic label, wherein the type identifies a type of write access control rule that is to control overwriting the value written to the entry; selecting a first write access control rule from a plurality of write access control rules based on the type written in the entry in response to a request to write a rewrite value to the entry; and performing a write access to the entry according to the first write access control rule in response to the request to write the rewrite value to the entry. - View Dependent Claims (2, 3)
-
-
4. A method for secure electronic labeling, the method comprising:
-
writing a value to a first memory having a length, the first memory being part of a machine-readable identification device; writing a type to a second memory in the machine-readable identification device; and imposing a first access control rule upon the first memory, wherein the first access control rule is that if the first memory is rewritten to, the length of the first memory is reduced to a predetermined size.
-
-
5. A method for secure electronic labeling, the method comprising:
-
writing a value to a first memory having a length; a writing type to a second memory; reading a request to overwrite the first memory; disallowing overwriting of the first memory if the type is of a first kind; overwriting the first memory and shortening the length of the first memory if the type is of a second kind; overwriting the first memory with new data and adjusting the length of the first memory to fit the new data if the type is of a third kind. - View Dependent Claims (6)
-
-
7. A method for secure electronic labeling, the method comprising:
-
writing a universal product code entry to a first memory, the universal product code entry having a first type, a first length, and a first value, the first memory being part of a machine-readable identification device that is part of an electronic label; writing a list price entry to a second memory, the list price entry having a second type, a second length, and a second value, the second memory being part of the machine-readable identification device that is part of the electronic label; writing a tracking number entry to a third memory, the tracking number entry having a third type, a third length, and a third value, the third memory being part of the machine-readable identification device that is part of the electronic label; associating the first type with a first access control rule such that the first access control rule is imposed upon the first memory, in accordance with the first type, wherein the first access control rule controls overwriting of the first value written to the first memory; associating the second type with a second access control rule such that the second access control rule is imposed upon the second memory in accordance with the second type, wherein the second access control rule controls overwriting of the second value written to the second memory; and associating the third type with a third access control rule such that the third access control rule is imposed upon the third memory in accordance wit the third type, wherein the third access control rule controls overwriting of the third value written to the third memory. - View Dependent Claims (8, 9, 10)
-
-
11. A method for secure electronic labeling, the method comprising the steps of:
-
writing a value to a first memory having a length, the first memory being part of a machine-readable identification device; associating a type value with the first memory such that an access control rule is imposed upon the first memory, in accordance with the type value, wherein the access control rule is such that if, first memory is rewritten to, the length of the first memory is reduced to a predetermined size.
-
-
12. A computer program product for secure electronic labeling, the computer program product comprising:
-
a computer usable medium having computer usable program code, said computer usable program code comprising; computer usable program code configured to write a value to a first memory having a length, the first memory being part of a machine-readable identification device; computer usable program code configured to write a type to a second memory in the machine-readable identification device; and computer usable program code configured to impose a first access control rule upon the first memory, wherein the first access control rule is that if the first memory is rewritten to, the length of to first memory is reduced to a predetermined size.
-
-
13. A computer program product for secure electronic labeling, the computer program product comprising:
-
a computer usable medium having computer usable program code, said computer usable program code comprising; computer usable program code configured to write a value to a first memory having a length; computer usable program code configured to write a type to a second memory; computer usable program code configured to read a request to overwrite the first memory; computer usable program code configured to disallow overwriting of the first memory if the type is of a first kind; computer usable program code configured to overwrite the first memory and to shorten the length of the first memory if the type is of a second kind; computer usable program code configured to overwrite the first memory with new data and to adjust the length of the first memory to fit the new data if the type is of a third kind. - View Dependent Claims (14)
-
-
15. A computer program product for secure electronic labeling, the computer program product comprising:
-
a computer usable medium having computer usable program code, said computer usable program code comprising; computer usable program code configured to write a value to a first memory having a length, the first memory being part of a machine-readable identification device; computer usable program code configured to associate a type value with the first memory such that an access control rule is imposed upon the first memory, in accordance with the type value, wherein the access control rule is such that if the first memory is rewritten to, the length of the first memory is reduced to a predetermined size.
-
-
16. An electronic label, comprising:
-
a communication unit; a controller, configured to receive data from the communication unit; a memory, having an entry stored therein, wherein the entry is a triple having a type, a length, and a value;
wherein the memory is configured to be written to by the controller;wherein the communication unit receives a rewrite value; wherein the controller receives the rewrite value from the communication unit, the controller selects a first write access control rule from a plurality of write access control rules based on the type stored in the entry; wherein the controller determines whether the rewrite value should be written to the memory, and if the controller determines that the value should be written to the memory, the controller writes the rewrite value to the memory. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. An apparatus for secure electronic labeling, comprising:
-
a communication unit; a controller, configured to receive data from the communication unit; a memory, having a length, and configured to be written to by the controller, wherein the communication unit receives a value, the controller receives the value from the communication unit, the controller evaluates an access control rule taken from a plurality of access control rules to determine whether the value should be written to the memory, and if the controller determines that the value should be written to the memory, the controller writes the value to the memory, wherein communication unit, controller, and memory are part of a same electronic label, and wherein the access control rule is such that the value is written to memory, but the length of the memory is reduced to a predetermined size. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57)
-
Specification