Methods and apparatus for authenticating devices in a network environment
First Claim
1. A method for authenticating operation of a transceiver with a control station within a wireless remote identification system, the method comprising:
- receiving transceiver configuration information including a network address and transceiver authentication credentials for associating with the transceiver, wherein receiving the authentication request includes receiving a first data value and a second data value from the control station;
receiving an authentication request from a control station within the remote identification system;
producing an authentication response for authenticating the transceiver by applying authentication processing to request information in the authentication request, the authentication processing being based on use of the transceiver authentication credentials associated with the transceiver, wherein producing the authentication response includes;
utilizing the first data value to identify an instruction of multiple instructions associated with the transceiver;
computing an authentication response value by applying the identified instruction to the second data value; and
generating the authentication response to include the authentication response value; and
transmitting the authentication response to the control station to allow the control station to determine if the transceiver is authorized to communicate within the remote identification system.
2 Assignments
0 Petitions
Accused Products
Abstract
Mechanisms and techniques provide for authenticating devices in a network such as a Radio Frequency Identification (RFID) Network between control stations and one or more transceivers. A transceiver receives transceiver configuration information including a network address and transceiver authentication credentials and receives an authentication request from the control station. The transceiver applies authentication processing to request information within the authentication request in conjunction with the transceiver authentication credentials to produce an authentication response and transmits the authentication response to the control station to allow the control station to determine if the transceiver is authorized to communicate within the remote identification system.
26 Citations
51 Claims
-
1. A method for authenticating operation of a transceiver with a control station within a wireless remote identification system, the method comprising:
-
receiving transceiver configuration information including a network address and transceiver authentication credentials for associating with the transceiver, wherein receiving the authentication request includes receiving a first data value and a second data value from the control station; receiving an authentication request from a control station within the remote identification system; producing an authentication response for authenticating the transceiver by applying authentication processing to request information in the authentication request, the authentication processing being based on use of the transceiver authentication credentials associated with the transceiver, wherein producing the authentication response includes; utilizing the first data value to identify an instruction of multiple instructions associated with the transceiver; computing an authentication response value by applying the identified instruction to the second data value; and generating the authentication response to include the authentication response value; and transmitting the authentication response to the control station to allow the control station to determine if the transceiver is authorized to communicate within the remote identification system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 23, 24)
-
-
22. A method for authenticating operation of a transceiver with a control station within a wireless remote identification system, the method comprising:
-
receiving transceiver configuration information including a network address and transceiver authentication credentials for associating with the transceiver; receiving an authentication request from a control station within the remote identification system; producing an authentication response for authenticating the transceiver by applying authentication processing to request information in the authentication request, the authentication processing being based on use of the transceiver authentication credentials associated with the transceiver; and transmitting the authentication response to the control station to allow the control station to determine if the transceiver is authorized to communicate within the remote identification system; wherein receiving transceiver configuration information including a network address and transceiver authentication credentials comprises; performing address assignment processing to receive the network address; receiving transceiver authentication credentials including receiving; i) a transceiver identification code uniquely assigned to the transceiver; and ii) a transceiver instruction set containing a set of authentication values and corresponding authentication instructions. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
-
31. In a control station for management of transceivers, a method for authenticating operation of a transceiver with the control station, the method comprising:
-
providing transceiver configuration information including a network address and transceiver authentication credentials to a transceiver; providing an authentication request from the control station within the remote identification system to the transceiver, the authentication request containing a request authentication result and a request data value; receiving an authentication response from the transceiver, the authentication response containing an authentication response answer to the authentication request, the authentication response answer including a computed data value derived by the transceiver applying a computational instruction to the request data value; and determining if the authentication response answer is valid by applying authentication processing to the authentication response answer within the authentication response in conjunction with the transceiver authentication credentials, and if the authentication response answer is valid, transmitting an authentication success message to the transceiver. - View Dependent Claims (32, 33)
-
-
34. A transceiver comprising:
-
a memory; a processor; a communications interface; an interconnection mechanism coupling the memory, the processor, and the communications interface, the memory encoded with an authentication process that when executed by the processor, causes the transceiver authenticate operation of the transceiver with a control station within a wireless remote identification system by causing the transceiver to perform the operations of; receiving, via the communications interface, transceiver configuration information including a network address and transceiver authentication credentials, receiving, via the communications interface, an authentication request from a control station within the remote identification system; applying authentication processing to request information within the authentication request by modifying the request information using the transceiver authentication credentials; producing an authentication response to include the modified request information; and transmitting, via the communications interface, the authentication response to the control station to allow the control station to determine if the transceiver is authorized to communicate within the remote identification system; wherein when the transceiver performs the operation of receiving transceiver configuration information including a network address and transceiver authentication credentials, the transceiver performs the operations of; performing address assignment processing to receive the network address; receiving transceiver authentication credentials including receiving; i) a transceiver identification code uniquely assigned to the transceiver; and ii) a transceiver instruction set containing a set of authentication values and corresponding authentication instructions. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A control station comprising:
-
a memory; a processor; a communications interface; an interconnection mechanism coupling the memory, the processor, and the communications interface, the memory encoded with an authentication process that when executed by the processor, causes the control station to authenticate operation of a transceiver with the control station within a wireless remote identification system by causing the control station to perform the operations of; providing, via the communications interface, transceiver configuration information including a network address and transceiver authentication credentials to a transceiver; providing, via the communications interface, an authentication request from the control station within the remote identification system to the transceiver, the authentication request containing a request authentication result and a request data value; receiving, via the communications interface, an authentication response from the transceiver, the authentication response containing an authentication response answer to the authentication request; and determining if the authentication response answer is valid by applying authentication processing to the authentication response answer within the authentication response in conjunction with the transceiver authentication credentials, and if the authentication response answer is valid, transmitting, via the communications interface, an authentication success message to the transceiver. - View Dependent Claims (46, 47)
-
-
48. A method for authenticating operation of a transceiver with a control station within a wireless remote identification system, the method comprising:
-
receiving transceiver configuration information including a network address and transceiver authentication credentials for associating with the transceiver, wherein receiving the authentication request includes receiving a first data value and a second data value from the control station; receiving an authentication request from a control station within the remote identification system; producing an authentication response for authenticating the transceiver by applying authentication processing to request information in the authentication request, the authentication processing being based on use of the transceiver authentication credentials associated with the transceiver, wherein producing the authentication response includes; utilizing the first data value to identify an instruction of multiple instructions associated with the transceiver; computing an authentication response value by applying the identified instruction to the second data value; and generating the authentication response to include the authentication response value; and transmitting the authentication response to the control station to allow the control station to determine if the transceiver is authorized to communicate within the remote identification system; wherein receiving the transceiver authentication credentials includes; receiving a first alphanumeric value and a corresponding first instruction; receiving a second alphanumeric value and a corresponding second instruction; and maintaining the first alphanumeric value and the corresponding first instruction at the transceiver as a first value-instruction pair; maintaining the second alphanumeric value and the corresponding second instruction at the transceiver as a second value-instruction pair. - View Dependent Claims (49, 50, 51)
-
Specification