Proxy device for enhanced privacy in an RFID system
First Claim
1. A method of operating a proxy device in an RFID system, the RFID system comprising a plurality of RFID devices and at least one reader which communicates with the proxy device and one or more of the RFID devices, the method comprising the steps of:
- acquiring in the proxy device information characterizing at least a given one of the RFID devices;
the proxy device controlling the given RFID device so as to at least partially prevent the given RFID device from being read by the reader, wherein the proxy device controls the given RFID device by communicating with the given RFID device in a manner which causes that RFID device to alter its output; and
the proxy device communicating with the reader in a manner which simulates the given RFID device;
wherein designation of the proxy device as such occurs prior to initiation of said controlling; and
wherein the proxy device communicates with the reader in a manner which simulates the given RFID device but withholds from the reader information that would otherwise be communicated by the given RFID device to the reader absent said controlling, in order to implement a designated privacy policy established for the given RFID device.
15 Assignments
0 Petitions
Accused Products
Abstract
A proxy device is disclosed for use in an RFID system comprising a plurality of RFID devices and at least one reader which communicates with the proxy device and one or more of the RFID devices. The proxy device acquires information characterizing at least a given one of the RFID devices, controls the given RFID device so as to at least partially prevent the given RFID device from being read by the reader, and communicates with the reader in a manner which simulates the given RFID device. This advantageously allows the proxy device to implement privacy policies of arbitrary sophistication on behalf of the given RFID device. The proxy device subsequently releases control of the given RFID device so as to permit the given RFID device to again be read by the reader.
-
Citations
29 Claims
-
1. A method of operating a proxy device in an RFID system, the RFID system comprising a plurality of RFID devices and at least one reader which communicates with the proxy device and one or more of the RFID devices, the method comprising the steps of:
-
acquiring in the proxy device information characterizing at least a given one of the RFID devices; the proxy device controlling the given RFID device so as to at least partially prevent the given RFID device from being read by the reader, wherein the proxy device controls the given RFID device by communicating with the given RFID device in a manner which causes that RFID device to alter its output; and the proxy device communicating with the reader in a manner which simulates the given RFID device; wherein designation of the proxy device as such occurs prior to initiation of said controlling; and wherein the proxy device communicates with the reader in a manner which simulates the given RFID device but withholds from the reader information that would otherwise be communicated by the given RFID device to the reader absent said controlling, in order to implement a designated privacy policy established for the given RFID device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. An apparatus for use in an RFID system comprising a plurality of RFID devices and at least one reader which communicates with one or more of the devices, the apparatus comprising:
-
a proxy device comprising a processor and a memory coupled to the processor, the proxy device being operative to acquire information characterizing at least a given one of the RFID devices, to control the given RFID device so as to at least partially prevent the given RFID device from being read by the reader, and to communicate with the reader in a manner which simulates the given RFID device; wherein the proxy device controls the given RFID device by communicating with the given RFID device in a manner which causes that RFID device to alter its output; wherein designation of the proxy device as such occurs prior to initiation of said control of the given RFID device by the proxy device; and wherein the proxy device communicates with the reader in a manner which simulates the given RFID device but withholds from the reader information that would otherwise be communicated by the given RFID device to the reader absent said control of the given RFID device by the proxy device in order to implement a designated privacy policy established for the given RFID device.
-
-
28. An apparatus for use in an RFID system comprising a plurality of RFID devices and at least one reader which communicates with one or more of the devices, the apparatus comprising:
-
a given RFID device configured for communication with a proxy device of the system, wherein the proxy device is operative to acquire information characterizing the given RFID device, the given RFID device being controllable by the proxy device so as to at least partially prevent the given RFID device from being read by the reader, the proxy device being further operative to communicate with the reader in a manner which simulates the given RFID device, wherein the proxy device controls the given RFID device by communicating with the given RFID device in a manner which causes that RFID device to alter its output; wherein designation of the proxy device as such occurs prior to initiation of said control of the given RFID device by the proxy device; and wherein the proxy device communicates with the reader in a manner which simulates the given RFID device but withholds from the reader information that would otherwise be communicated by the given RFID device to the reader absent said control of the given RFID device by the proxy device, in order to implement a designated privacy policy established for the given RFID device.
-
-
29. An article of manufacture comprising a machine-readable storage medium storing one or more programs for operating a proxy device in an RFID system, the RFID system comprising a plurality of RFID devices and at least one reader which communicates with the proxy device and one or more of the RFID devices, wherein the one or more programs when executed by the proxy device implement the steps of:
-
acquiring information in the proxy device characterizing at least a given one of the RFID devices; the proxy device controlling the given RFID device so as to at least partially prevent the given RFID device from being read by the reader, wherein the proxy device controls the given RFID device by communicating with the given RFID device in a manner which causes that RFID device to alter its output; and the proxy device communicating with the reader in a manner which simulates the given RFID device wherein designation of the proxy device as such occurs prior to initiation of said controlling; and wherein the proxy device communicates with the reader in a manner which simulates the given RFID device but withholds from the reader information that would otherwise be communicated by the given RFID device to the reader absent said controlling, in order to implement a designated privacy policy established for the given RFID device.
-
Specification