Radio frequency identification tag and radio frequency identification privacy protection system and method
First Claim
1. A radio frequency identification (RFID) privacy protection method applied to an RFID privacy protection system comprising an RFID tag including a pseudo identification (ID) and a RFID that is different from the pseudo ID, and an RFID reader, the method comprising:
- receiving, by the RFID reader, the pseudo ID, from the RFID tag;
transmitting, by the RFID reader, the pseudo ID received from the RFID tag to an authentication service provider;
receiving, by the RFID reader, a key used to generate a pseudo ID from the authentication service provider;
if the pseudo ID is received in response to an information request signal for reading information of the RFID tag comprising the pseudo ID, transmitting, by the RFID reader, the key to the RFID tag; and
if a pseudo ID generated using the key is equal to the pseudo ID received in response to the information request signal, receiving, by the RFID reader, the RFID of the RFID tag to read the information of the RFID tag,wherein the pseudo ID is not a substantial RFID of the RFID tag, but an ID used to authenticate regardless if the RFID reader that transmitted the RFID request signal is able to read private information set in the RFID tag, and the RFID is provided after the authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
A radio frequency identification (RFID) tag, an RFID privacy protection system, and an RFID privacy protection method are provided. The RFID privacy protection method includes a pseudo identification (ID) used to authenticate the RFID reader and a key used to generate the pseudo ID are received; if the pseudo ID is received in response to an information request signal for reading information of the RFID tag comprising the pseudo ID, the key is transmitted; and if a pseudo ID generated using the key is equal to the pseudo ID received in response to the information request signal, an RFID of the RFID tag to read the information of the RFID tag is received.
-
Citations
8 Claims
-
1. A radio frequency identification (RFID) privacy protection method applied to an RFID privacy protection system comprising an RFID tag including a pseudo identification (ID) and a RFID that is different from the pseudo ID, and an RFID reader, the method comprising:
-
receiving, by the RFID reader, the pseudo ID, from the RFID tag; transmitting, by the RFID reader, the pseudo ID received from the RFID tag to an authentication service provider; receiving, by the RFID reader, a key used to generate a pseudo ID from the authentication service provider; if the pseudo ID is received in response to an information request signal for reading information of the RFID tag comprising the pseudo ID, transmitting, by the RFID reader, the key to the RFID tag; and if a pseudo ID generated using the key is equal to the pseudo ID received in response to the information request signal, receiving, by the RFID reader, the RFID of the RFID tag to read the information of the RFID tag, wherein the pseudo ID is not a substantial RFID of the RFID tag, but an ID used to authenticate regardless if the RFID reader that transmitted the RFID request signal is able to read private information set in the RFID tag, and the RFID is provided after the authentication. - View Dependent Claims (2, 3)
-
-
4. A radio frequency identification (RFID) tag of an RFID privacy protection system comprising a RFID tag and an RFID reader, the RFID tag comprising:
-
a pseudo identification (ID); a RFID that is different from the pseudo ID; a transceiver for receiving and transmitting the pseudo ID and a key; a tag storage for storing the pseudo ID used to authenticate the RFID reader; a determiner for determining whether the stored pseudo ID is equal to a pseudo ID generated using the received key, if a key corresponding to the pseudo ID transmitted in response to an information transmission request signal of the RFID reader is received; and a tag controller for transmitting the RFID of the RFID tag through the transceiver, if the stored pseudo ID is equal to the generated pseudo ID, wherein the pseudo ID is not a substantial RFID of the RFID tag, but an ID used to authenticate regardless if the RFID reader that transmitted the RFID request signal is able to read private information set in the RFID tag, and the RFID is provided after the authentication. - View Dependent Claims (5)
-
-
6. A radio frequency identification (RFID) privacy protection system comprising an RFID tag including a pseudo identification (ID) and a RFID that is different from the pseudo ID, an RFID reader, and a device including an RFID reader function, the device including an RFID reader function comprising:
-
a transceiver for receiving and transmitting the pseudo ID and a key; an RFID interface for transmitting an information request signal for reading information of the RFID tag; a storage for storing the pseudo ID and a key used to generate the pseudo ID received through the transceiver from the authenticated RFID reader; and a controller for transmitting the key to the RFID tag through the RFID interface if the pseudo ID is received in response to the information request signal, and receiving the RFID of the RFID tag, wherein the pseudo ID is not a substantial RFID of the RFID tag, but an ID used to authenticate regardless if the RFID reader that transmitted the RFID request signal is able to react private information set in the RFID tag, and the RFID is provided after the authentication. - View Dependent Claims (7, 8)
-
Specification