Protection of non-promiscuous data in an RFID transponder
First Claim
Patent Images
1. A radio frequency identification device (RFID), comprising:
- a controller;
a RF receiver/transmitter adapted for wireless coupling to a RF interrogator; and
a memory comprising a promiscuous region and a non-promiscuous region, wherein at least one of configuration data, shared-secret data, and holder data is stored as one or several data segments each selectively associated with at least one of the promiscuous region and the non-promiscuous region, wherein data from the promiscuous region is promiscuously transmitted by the RF receiver/transmitter to the RF interrogator when the RFID is disposed in an active zone of the reader.
2 Assignments
0 Petitions
Accused Products
Abstract
A radio frequency identification device (RFID) and method for authenticating RFIDs are disclosed. In RFIDs, data is stored in a form of data segments selectively associated with promiscuous and non-promiscuous regions of their memories. A randomly selected portion of a content of a non-promiscuous region is examined by an interrogating readers or a host computer after validating the data contained in a promiscuous region.
-
Citations
65 Claims
-
1. A radio frequency identification device (RFID), comprising:
-
a controller; a RF receiver/transmitter adapted for wireless coupling to a RF interrogator; and a memory comprising a promiscuous region and a non-promiscuous region, wherein at least one of configuration data, shared-secret data, and holder data is stored as one or several data segments each selectively associated with at least one of the promiscuous region and the non-promiscuous region, wherein data from the promiscuous region is promiscuously transmitted by the RF receiver/transmitter to the RF interrogator when the RFID is disposed in an active zone of the reader. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A radio frequency identification device (RFID), comprising:
-
a controller; a RF receiver/transmitter adapted for wireless coupling to a RF interrogator; and a memory comprising a promiscuous region and a non-promiscuous region wherein at least one of configuration data, shared-secret data and holder data is stored as one or several data segments each selectively associated with at least one of the promiscuous region and the non-promiscuous region, wherein the one or more of the data segments associated with the promiscuous region contain authentication data and a content of the data segments associated with the non-promiscuous region is transmitted to the reader by the RFID disposed in the active zone after the reader decodes and validates said authentication data. - View Dependent Claims (17, 18, 19)
-
-
20. A method for authenticating radio frequency identification devices (RFIDs), comprising:
-
(a) providing a system including; a plurality of RFIDs each having a memory comprising a promiscuous region and a non-promiscuous region, wherein at least one of configuration data, shared-secret data, and holder data is stored a form of one or several data segments each associated with at least one of the promiscuous region and the non-promiscuous region; and at least one reader for reading and interrogating the RFIDs; (b) receiving from an RFID, promiscuous data including a content of the data segments associated with the promiscuous region; (c) verifying the promiscuous data; (d) requesting from the RFID, non-promiscuous data including a content of at least one data segment associated with randomly selected data from the non-promiscuous region; (e) receiving the at least one non-promiscuous data segment requested from the RFID; (f) verifying the non-promiscuous data; and (g) accepting or rejecting the RFID based upon steps (c)-(f). - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A system for authenticating radio frequency identification devices (RFIDs), comprising:
-
at least one interrogator; and at least one RFID comprising memory, wherein the memory comprises a promiscuous region and a non-promiscuous region, wherein at least one of configuration data, shared-secret data, and holder data is stored as one or several data segments each associated with at least one of the promiscuous region and the non-promiscuous region, wherein a content of the data segments associated with the promiscuous region is freely transmitted to the reader when the RFID is disposed within an active zone of the reader. - View Dependent Claims (39, 40, 41, 42)
-
-
43. A system for authenticating radio frequency identification devices (RFIDs), comprising:
-
at least one interrogator; and at least one RFID comprising memory, wherein the memory comprises a promiscuous region and a non-promiscuous region, wherein at least one of configuration data, shared-secret data, and holder data is stored as one or several data segments each associated with at least one of the promiscuous region and the non-promiscuous region, wherein the one or more of the data segments associated with the promiscuous region contains authentication data and a content of the data segments associated with the non-promiscuous region is transmitted to the at least one interrogator by the RFID disposed in the active zone after the at least one interrogator decodes and validates said shared-secret data. - View Dependent Claims (44, 45)
-
-
46. A method of updating a security access system comprising one or more first radio frequency interrogation devices (readers) and one or more first radio frequency identification devices (RFIDs), the first readers only configured to communicate with the first RFIDs, the first RFIDs comprising a memory containing a promiscuous region, the method comprising,
(a) replacing some or all of the first RFIDs with second RFIDs, the second RFIDs having a promiscuous and a non-promiscuous region, and further comprising configuration data, shared-secret data or holder data stored in the form of one or multiple data segments each selectively associated with the promiscuous or non-promiscuous regions; -
(b) replacing the first readers with second readers, the second readers configured to communicate with first RFIDs and second RFIDs; (c) transmitting a content of data segments associated with the promiscuous region to a second reader when either a first RFID or a second RFID is present in the active zone of a second reader, and wherein said data segments contain authentication data; (d) determining access rights of the first RFID with respect to a restricted asset; (e) requesting at least a portion of the non-promiscuous data from the second RFID, including content of at least one randomly selected data segment from the non-promiscuous region; (f) receiving the requested non-promiscuous data from the second RFID; (g) determining access rights of the second RFID with respect to a restricted asset. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53, 54, 55)
-
-
56. A security access system, comprising:
-
(a) at least one first RFID, having first data in a promiscuous region; (b) at least one second RFID having data in both a promiscuous data region and a non-promiscuous data region; and (c) at least one first reader that operatively communicates with said at least one first and second RFIDs, wherein at least one of configuration data, shared-secret data, and holder data is stored as one or several data segments each associated with at least one of the promiscuous region and the non-promiscuous region of said at least one second RFID, and wherein at least one of configuration data, shared-secret data, and holder data is stored as one or several data segment associated with the promiscuous region of said at least one first RFID. - View Dependent Claims (57, 58, 59, 60, 61, 62, 63, 64, 65)
-
Specification