×

RFID and sensor signing algorithm

  • US 7,800,499 B2
  • Filed: 06/05/2007
  • Issued: 09/21/2010
  • Est. Priority Date: 06/05/2007
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for signing tags associated with objects, the method comprising:

  • receiving, at a computer system that provides one or more applications with tracking information associated with the objects, a first identifier associated with an object, the first identifier configured to be used by the one or more applications to obtain tracking information associated with the object from the computer system;

    determining, with a processor associated with the computer system, a bit-reducing scheme for generating identifiers to be stored in tags;

    generating, with the processor associated with the computer system, a second identifier for a tag associated with the object based on the bit-reducing scheme applied to the first identifier, the second identifier having a predetermined key portion set according to the bit-reducing scheme and configured to be stored in the tag and readable by one or more tag reading devices to recognize the tag when in the presence of the tag, the second identifier being different from the first identifier and having a smaller number of bits than the first identifier;

    generating, with the processor associated with the computer system, information reserved in secret from the one or more applications that associates the first identifier associated with the object with the second identifier for the tag such that the one or more applications obtain first tracking information from the computer system for the object based on the first identifier, the first tracking information derived from at least one of the one or more tag reading devices in response to an authentication from reading the second identifier from the tag;

    determining, with the processor associated with the computer system, a private key-public key pair for the bit-reducing scheme from a plurality of private key-public key pairs accessible to the computer-system;

    wherein said key pair corresponds to said predetermined key portion;

    generating, with the processor associated with the computer system, a first signature for the tag based on and in response to encrypting the second identifier with a selected public key in the private key-public key pair;

    storing the second identifier and the first signature in the tag.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×