RFID and sensor signing algorithm
First Claim
Patent Images
1. A computer-implemented method for signing tags associated with objects, the method comprising:
- receiving, at a computer system that provides one or more applications with tracking information associated with the objects, a first identifier associated with an object, the first identifier configured to be used by the one or more applications to obtain tracking information associated with the object from the computer system;
determining, with a processor associated with the computer system, a bit-reducing scheme for generating identifiers to be stored in tags;
generating, with the processor associated with the computer system, a second identifier for a tag associated with the object based on the bit-reducing scheme applied to the first identifier, the second identifier having a predetermined key portion set according to the bit-reducing scheme and configured to be stored in the tag and readable by one or more tag reading devices to recognize the tag when in the presence of the tag, the second identifier being different from the first identifier and having a smaller number of bits than the first identifier;
generating, with the processor associated with the computer system, information reserved in secret from the one or more applications that associates the first identifier associated with the object with the second identifier for the tag such that the one or more applications obtain first tracking information from the computer system for the object based on the first identifier, the first tracking information derived from at least one of the one or more tag reading devices in response to an authentication from reading the second identifier from the tag;
determining, with the processor associated with the computer system, a private key-public key pair for the bit-reducing scheme from a plurality of private key-public key pairs accessible to the computer-system;
wherein said key pair corresponds to said predetermined key portion;
generating, with the processor associated with the computer system, a first signature for the tag based on and in response to encrypting the second identifier with a selected public key in the private key-public key pair;
storing the second identifier and the first signature in the tag.
1 Assignment
0 Petitions
Accused Products
Abstract
In various embodiments, a method for signing tags associated with objects includes receiving a first identifier associated with a tag. A first signature is generated for the tag based on the identifier and a public key. The first identifier and the first signature are then stored in the tag.
42 Citations
20 Claims
-
1. A computer-implemented method for signing tags associated with objects, the method comprising:
-
receiving, at a computer system that provides one or more applications with tracking information associated with the objects, a first identifier associated with an object, the first identifier configured to be used by the one or more applications to obtain tracking information associated with the object from the computer system; determining, with a processor associated with the computer system, a bit-reducing scheme for generating identifiers to be stored in tags; generating, with the processor associated with the computer system, a second identifier for a tag associated with the object based on the bit-reducing scheme applied to the first identifier, the second identifier having a predetermined key portion set according to the bit-reducing scheme and configured to be stored in the tag and readable by one or more tag reading devices to recognize the tag when in the presence of the tag, the second identifier being different from the first identifier and having a smaller number of bits than the first identifier; generating, with the processor associated with the computer system, information reserved in secret from the one or more applications that associates the first identifier associated with the object with the second identifier for the tag such that the one or more applications obtain first tracking information from the computer system for the object based on the first identifier, the first tracking information derived from at least one of the one or more tag reading devices in response to an authentication from reading the second identifier from the tag; determining, with the processor associated with the computer system, a private key-public key pair for the bit-reducing scheme from a plurality of private key-public key pairs accessible to the computer-system;
wherein said key pair corresponds to said predetermined key portion;generating, with the processor associated with the computer system, a first signature for the tag based on and in response to encrypting the second identifier with a selected public key in the private key-public key pair; storing the second identifier and the first signature in the tag. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A data processing system for signing tags associated with objects, the system comprising:
-
a processor; and a memory coupled to the processor, the memory storing a plurality of code modules which when executed by the processor configure the processor to; receive a first identifier associated with an object, the first identifier being used by one or more applications to obtain tracking information associated with the object; determine a bit-reducing scheme applied to the first identifier for generating identifiers to be stored in tags; generate a second identifier for the a tag associated with the object based on the bit-reducing scheme, the second identifier having a predetermined key portion according to the bit-reducing scheme and configured to be stored in the tag and readable by one or more tag reading devices to recognize the tag when in the presence of the tag, the second identifier being different from the first identifier and having a smaller number of bits than the first identifier; generate information reserved in secret from the one or more applications that associates the first identifier associated with the object with the second identifier such that the one or more applications obtain first tracking information for the object based on the first identifier, the first tracking information derived from at least one of the one or more tag reading devices in response to an authentication from reading the second identifier from the tag; store the information associating the first identifier associated with the object with the second identifier in a database; determine a private key-public key pair for the bit-reducing scheme from a plurality of private key-public key pairs;
wherein said key pair corresponds to said predetermined key portion;generate a first signature for the tag based on and in response to encrypting the second identifier with a selected public key in the private key-public key pair; and generate one or more instructions to store the second identifier and the first signature in the tag. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable storage medium storing a computer program product executable by one or more processors of one or more computer systems for signing tags associated with objects, the computer-readable storage medium comprising:
-
code for receiving a first identifier associated with an object, the first identifier being used by one or more applications to obtain tracking information associated with the objects; code for determining a bit-reducing scheme applied to the first identifier for generating identifiers to be stored in tags; code for generating a second identifier for a tag associated with the object based on a bit-reducing scheme, the second identifier having a key predetermined portion according to the bit-reducing scheme and configured to be stored in the tag and readable by one or more tag reading devices to recognize the tag when in the presence of the tag, the second identifier being different from the first identifier and having a smaller number of bits than the first identifier; code for generating information reserved in secret from the one or more applications that associates the first identifier associated with the object with the second identifier such that the one or more applications obtain first tracking information for the object based on the first identifier, the first tracking information derived from at least one of the one or more tag reading devices in response to an authentication from reading the second identifier from the tag; code for determining a private key-public key pair for the bit-reducing scheme from a plurality of private key-public key pairs;
wherein said key pair corresponds to said predetermined key portion;code for generating a first signature for the tag based on and in response to encrypting the second identifier with a selected public key in the private-key-public key pair; and code for storing the second identifier and the first signature in the tag. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification