Systems and methods for RFID security
First Claim
Patent Images
1. A method of transmitting information between a radio frequency identification (RFID) tag and a server, said method comprising the steps of:
- encrypting, by said RFID tag according to a predetermined scheme, identification data identifying said RFID tag, to result in encrypted RFID information;
reading, by a RFID reader, said encrypted RFID information from said RFID tag;
transmitting, from said RFID reader to said server, a transmission, wherein said transmission includes said encrypted RFID information;
decrypting, by said server according to said predetermined scheme, said encrypted RFID information to produce said identification data;
generating, by said RFID tag prior to said step of encrypting, a first pseudorandom number, wherein said step of encrypting is performed using said first pseudorandom number; and
generating, by said server prior to said step of decrypting, a second pseudorandom number, wherein said second pseudorandom number corresponds to said first pseudorandom number, and wherein said step of decrypting is performed using said second pseudorandom number.
3 Assignments
0 Petitions
Accused Products
Abstract
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.
79 Citations
57 Claims
-
1. A method of transmitting information between a radio frequency identification (RFID) tag and a server, said method comprising the steps of:
-
encrypting, by said RFID tag according to a predetermined scheme, identification data identifying said RFID tag, to result in encrypted RFID information; reading, by a RFID reader, said encrypted RFID information from said RFID tag; transmitting, from said RFID reader to said server, a transmission, wherein said transmission includes said encrypted RFID information; decrypting, by said server according to said predetermined scheme, said encrypted RFID information to produce said identification data; generating, by said RFID tag prior to said step of encrypting, a first pseudorandom number, wherein said step of encrypting is performed using said first pseudorandom number; and generating, by said server prior to said step of decrypting, a second pseudorandom number, wherein said second pseudorandom number corresponds to said first pseudorandom number, and wherein said step of decrypting is performed using said second pseudorandom number. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of transmitting information between a radio frequency identification (RFID) tag and a server, said method comprising the steps of:
-
encrypting, by said RFID tag according to a predetermined scheme, identification data identifying said RFID tag, to result in encrypted RFID information; reading, by a RFID reader, said encrypted RFID information from said RFID tag; transmitting, from said RFID reader to said server, a transmission, wherein said transmission includes said encrypted RFID information; decrypting, by said server according to said predetermined scheme, said encrypted RFID information to produce said identification data; and performing, by said server, synchronization contingency processing when said step of decrypting results in a failure. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of transmitting information between a radio frequency identification (RFID) tag and a server, said method comprising the steps of:
-
encrypting, by said RFID tag according to a predetermined scheme, identification data identifying said RFID tag, to result in encrypted RFID information; reading, by a RFID reader, said encrypted RFID information from said RFID tag; transmitting, from said RFID reader to said server, a transmission, wherein said transmission includes said encrypted RFID information; decrypting, by said server according to said predetermined scheme, said encrypted RFID information to produce said identification data; communicating, by said reader, timing information to said RFID tag; and updating, by said RFID tag, an encryption key using said timing information, wherein said encryption key is used in said step of encrypting. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method of transmitting information between a radio frequency identification (RFID) tag and a server, said method comprising the steps of:
-
encrypting, by said RFID tag according to a predetermined scheme, identification data identifying said RFID tag, to result in encrypted RFID information; reading, by a RFID reader, said encrypted RFID information from said RFID tag; transmitting, from said RFID reader to said server, a transmission, wherein said transmission includes said encrypted RFID information; decrypting, by said server according to said predetermined scheme, said encrypted RFID information to produce said identification data; communicating, by said server, timing information to said RFID tag; and updating, by said RFID tag, an encryption key using said timing information, wherein said encryption key is used in said step of encrypting. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A method of transmitting information between a radio frequency identification (RFID) tag and a server, said method comprising the steps of:
-
encrypting, by said RFID tag according to a predetermined scheme, identification data identifying said RFID tag, to result in encrypted RFID information; reading, by a RFID reader, said encrypted RFID information from said RFID tag; transmitting, from said RFID reader to said server, a transmission, wherein said transmission includes said encrypted RFID information; decrypting, by said server according to said predetermined scheme, said encrypted RFID information to produce said identification data, wherein said RFID tag stores a first plurality of encryption keys, wherein said server stores a second plurality of encryption keys, wherein said first plurality of encryption keys corresponds to said second plurality of encryption keys; and communicating, by said server via said reader, a pointer to said RFID tag, wherein said pointer points to a selected one of said first plurality of encryption keys, wherein said RFID tag uses said selected one of said first plurality of encryption keys when encrypting, and wherein said server uses a corresponding selected one of said second plurality of encryption keys when decrypting. - View Dependent Claims (39, 40, 41, 42, 43, 44)
-
-
45. A method of transmitting information between a radio frequency identification (RFID) tag and a server, said method comprising the steps of:
-
encrypting, by said RFID tag according to a predetermined scheme, identification data identifying said RFID tag, to result in encrypted RFID information; reading, by a RFID reader, said encrypted RFID information from said RFID tag; transmitting, from said RFID reader to said server, a transmission, wherein said transmission includes said encrypted RFID information; decrypting, by said server according to said predetermined scheme, said encrypted RFID information to produce said identification data, wherein said RFID tag stores a first plurality of encryption keys, wherein said server stores a second plurality of encryption keys, wherein said first plurality of encryption keys corresponds to said second plurality of encryption keys; communicating, by said reader, a pointer to said RFID tag, wherein said pointer points to a selected one of said first plurality of encryption keys, and wherein said RFID tag uses said selected one of said first plurality of encryption keys when encrypting; and communicating, by said reader, said pointer to said server, wherein said pointer points to a corresponding selected one of said second plurality of encryption keys, and wherein said server uses said corresponding selected one of said second plurality of encryption keys when decrypting. - View Dependent Claims (46, 47, 48, 49, 50, 51)
-
-
52. An apparatus including a radio frequency identification (RFID) tag for use in an RFID system including an RFID reader and a server, said RFID tag comprising:
-
a transceiver that communicates with said RFID reader; a processor, coupled to said transceiver, that encrypts, according a predetermined scheme, identification data that identifies said RFID tag, and that generates an authentication code; a display, coupled to said processor, that displays said authentication code; and wherein said RFID tag further comprises a switch, where said RFID tag receives information from a reader, and a user verifies the information from the reader and activates the tag using the switch, and said RFID tag transmits information to the reader only if said user verifies the information from the reader. - View Dependent Claims (53)
-
-
54. An apparatus including a radio frequency identification (RFID) tag for use in an RFID system including an RFID reader and a server, said RFID tag comprising:
-
a processor, coupled to said transceiver, that encrypts, according a predetermined scheme, identification data that identifies said RFID tag, and that generates an authentication code; and a display, coupled to said processor, that displays said authentication code, wherein said RFID tag receives information from a reader and displays the information to a user, and wherein said RFID tag displays the information from the reader to the user before said RFID tag sends an encrypted identification data to the reader.
-
-
55. An apparatus including a radio frequency identification (RFID) tag for use in an RFID system including an RFID reader, said RFID tag comprising:
-
a switch for activating said RFID tag; a transceiver that communicates with said RFID reader; and a processor, coupled to said transceiver, that processes information received from said RFID reader, wherein said RFID tag receives first information from said RFID reader and displays at least a portion of the first information to a user, and wherein identification data is transmitted from said RFID tag to said RFID reader if the first information has been verified using said switch. - View Dependent Claims (56, 57)
-
Specification