Contact-less tag with signature, and applications thereof
First Claim
1. A method, comprising:
- obtaining a signature from a contactlessly readable tag;
decrypting the signature with a key to obtain;
a candidate identifier, anda scrambling code associated with the signature; and
validating the candidate identifier based on at least one of the scrambling code and the signature;
wherein validating comprises at least one of;
determining whether said signature has been previously received;
determining whether said scrambling code was encoded in a previously received signature also encoding the candidate identifier and determining whether said scrambling code or signature corresponds to an expected scrambling code or signature for said tag.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, comprising: obtaining a signature from a contactlessly readable tag; decrypting the signature with a key to obtain (i) a candidate identifier and (ii) a scrambling code associated with the signature; and validating the candidate identifier based on at least one of the scrambling code and the signature. Also, a system, comprising: at least one tag reader configured to receive a plurality of signatures released by a respective plurality of tags, including a particular signature released by a particular one of the tags, and to cause decryption of the particular signature with a key to obtain (i) a candidate identifier, and (ii) a scrambling code associated with the signature; and a processing entity configured to effect validation of the candidate identifier based on at least one of the scrambling code and the signature.
-
Citations
57 Claims
-
1. A method, comprising:
-
obtaining a signature from a contactlessly readable tag; decrypting the signature with a key to obtain; a candidate identifier, and a scrambling code associated with the signature; and validating the candidate identifier based on at least one of the scrambling code and the signature; wherein validating comprises at least one of;
determining whether said signature has been previously received;
determining whether said scrambling code was encoded in a previously received signature also encoding the candidate identifier and determining whether said scrambling code or signature corresponds to an expected scrambling code or signature for said tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method, comprising:
-
obtaining a signature from a contactlessly readable tag; decrypting the signature with a key to obtain; a candidate identifier, and a scrambling code associated with the signature; and validating the candidate identifier based on at least one of the scrambling code and the signature; receiving an index accompanying the signature; and consulting a storage entity that stores potential keys associated with respective indexes to identify said key as the potential key associated with the index accompanying the signature. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A method, comprising:
-
obtaining a signature from a contactlessly readable tag; decrypting the signature with a key to obtain; a candidate identifier, and a scrambling code associated with the signature; and validating the candidate identifier based on at least one of the scrambling code and the signature; and consulting a storage entity comprising a plurality of potential keys; wherein said decrypting is performed using a first one of said potential keys. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A computer-readable medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method, the computer-readable program code comprising:
-
first computer-readable program code for causing the computing apparatus to obtain a signature from a tag; second computer-readable program code for causing the computing apparatus to decrypt the signature with a key to obtain; a candidate identifier, and a scrambling code associated with the signature; and third computer-readable program code for causing the computing apparatus to validate the candidate identifier based on at least one of the scrambling code and the signature; wherein validating comprises at least one of;
determining whether said signature has been previously received;
determining whether said scrambling code was encoded in a previously received signature also encoding the candidate identifier and determining whether said scrambling code or signature corresponds to an expected scrambling code or signature for said tag.
-
-
36. A system, comprising:
-
at least one tag reader configured to receive a plurality of signatures released by a respective plurality of tags, including a particular signature released by a particular one of the tags, and to cause decryption of the particular signature with a key to obtain; a candidate identifier, and a scrambling code associated with the signature; and a processing entity configured to effect validation of the candidate identifier based on at least one of the scrambling code and the signature; wherein to effect said validation, said processing entity is configured to effect at least one of (i) a determination of whether said signature has been previously received;
(ii) a determination of whether said scrambling code was encoded in a previously received signature also encoding the candidate identifier;
(iii) a determination of a number of times that said signature has been previously received; and
(iv) a determination of how long ago said signature was first received. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A system, comprising:
-
means for receiving a plurality of signatures released by a respective plurality of tags, including a particular signature released by a particular one of said tags; means for decrypting the particular signature with a key to obtain (I) a candidate identifier, and (II) a scrambling code associated with the signature; and means for validating the candidate identifier based on at least one of the scrambling code and the signature; wherein to effect said validation, said processing entity is configured to effect at least one of (i) a determination of whether said signature has been previously received;
(ii) a determination of whether said scrambling code was encoded in a previously received signature also encoding the candidate identifier;
(iii) a determination of a number of times that said signature has been previously received; and
(iv) a determination of how long ago said signature was first received.
-
-
56. A computer-readable medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method, the computer-readable program code comprising:
-
first computer-readable program code for causing the computing apparatus to obtain a signature from a tag; second computer-readable program code for causing the computing apparatus to decrypt the signature with a key to obtain; a candidate identifier, and a scrambling code associated with the signature; and third computer-readable program code for causing the computing apparatus to validate the candidate identifier based on at least one of the scrambling code and the signature; fourth computer-readable program code for causing the computing apparatus to receive an index accompanying the signature; and fifth computer-readable program code for causing the computing apparatus to consult a storage entity that stores potential keys associated with respective indexes to identify said key as the potential key associated with the index accompanying the signature.
-
-
57. A computer-readable medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method, the computer-readable program code comprising:
-
first computer-readable program code for causing the computing apparatus to obtain a signature from a tag; second computer-readable program code for causing the computing apparatus to decrypt the signature with a key to obtain; a candidate identifier, and a scrambling code associated with the signature; and third computer-readable program code for causing the computing apparatus to validate the candidate identifier based on at least one of the scrambling code and the signature; fourth computer-readable program code for causing the computing apparatus to consult a storage entity comprising a plurality of potential keys; wherein decrypting of the signature is performed using a first one of said potential keys.
-
Specification