Enhanced RFID instrument security
First Claim
Patent Images
1. A method, comprising:
- receiving, at an RFID read device, RFID tag information from an RFID tag, wherein the RFID tag information comprises a tag identification code and an encrypted tag authentication code, and wherein the RFID tag information comprises encrypted data that is encrypted according to a tag security protocol associated with the RFID tag;
decrypting, by the RFID read device, the encrypted tag authentication code using a decryption key to authenticate the RFID tag, wherein the decryption key is associated with the tag identification code, and wherein the RFID tag mutually authenticates the RFID reader; and
validating, by the RFID read device, the encrypted data received from the RFID tag by communicating with a tag processing service (TPS), wherein the encrypted data is decrypted using the tag security protocol maintained by the TPS, and wherein the validating is in response to the RFID read device authenticating the RFID tag.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for using an RFID read/write device to secure an RFID-operable instrument or an RF communication is provided. The invention includes security databases in communication with a processor for storing and communicating security protocols to the RFID read/write device. The invention includes a method for restricting the unauthorized use of an RFID read/write device. The invention includes a subscription service for communicating user credentials to a certificate authority to obtain a counter security protocol. The invention also includes decrypting information stored on an RF-operable device or transmitted via radio-frequency using counter security protocols.
-
Citations
27 Claims
-
1. A method, comprising:
-
receiving, at an RFID read device, RFID tag information from an RFID tag, wherein the RFID tag information comprises a tag identification code and an encrypted tag authentication code, and wherein the RFID tag information comprises encrypted data that is encrypted according to a tag security protocol associated with the RFID tag; decrypting, by the RFID read device, the encrypted tag authentication code using a decryption key to authenticate the RFID tag, wherein the decryption key is associated with the tag identification code, and wherein the RFID tag mutually authenticates the RFID reader; and validating, by the RFID read device, the encrypted data received from the RFID tag by communicating with a tag processing service (TPS), wherein the encrypted data is decrypted using the tag security protocol maintained by the TPS, and wherein the validating is in response to the RFID read device authenticating the RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
receiving, by a tag processing service (TPS), a request from an RFID read device to validate encrypted data received by the RFID read device from an RFID tag, wherein the encrypted data is encrypted according to a tag security protocol associated with the RFID tag, and wherein the TPS receives the request in response to the RFID read device and the RFID tag mutually authenticating; obtaining, by the TPS, the tag security protocol from a certificates database; and transmitting validated data, from the TPS to the RFID read device, wherein the TPS generates the validated data from the encrypted data using the tag security protocol associated with the RFID tag. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. An RFID read device including a tangible, non-transitory memory having instructions stored thereon that, in response to execution by the RFID read device, cause the RFID read device to perform operations comprising:
-
receiving, at the RFID read device, RFID tag information from an RFID tag, wherein the RFID tag information comprises a tag identification code and an encrypted tag authentication code, and wherein the RFID tag information comprises encrypted data that is encrypted according to a tag security protocol associated with the RFID tag; decrypting, at the RFID read device, the encrypted tag authentication code using a decryption key to authenticate the RFID tag, wherein the decryption key is associated with the tag identification code, and wherein the RFID tag mutually authenticates the RFID reader; and validating, at the RFID read device, the encrypted data received from the RFID tag by communicating with a tag processing service (TPS), wherein the encrypted data is decrypted using the tag security protocol maintained by the TPS, and wherein the validating is in response to the RFID read device authenticating the RFID tag.
-
-
23. An RFID read device, comprising:
-
a transponder configured to receive RFID tag information from an RFID tag, wherein the RFID tag information comprises a tag identification code and an encrypted tag authentication code, and wherein the RFID tag information comprises encrypted data that is configured to be encrypted according to a tag security protocol associated with the RFID tag; and a processor configured to decrypt the encrypted tag authentication code using a decryption key to authenticate the RFID tag, wherein the decryption key is associated with the tag identification code, and wherein the RFID tag is configured to mutually authenticate the RFID reader; wherein the processor is configured to validate the encrypted data received from the RFID tag by communicating with a tag processing service (TPS), wherein the encrypted data is configured to be decrypted using the tag security protocol maintained by the TPS, and wherein the processor is configured to validate the encrypted data in response to the RFID read device authenticating the RFID tag.
-
-
24. An RFID read device, comprising:
-
means for receiving, at the RFID read device, RFID tag information from an RFID tag, wherein the RFID tag information comprises a tag identification code and an encrypted tag authentication code, and wherein the RFID tag information comprises encrypted data that is encrypted according to a tag security protocol associated with the RFID tag; means for decrypting, at the RFID read device, the encrypted tag authentication code using a decryption key to authenticate the RFID tag, wherein the decryption key is associated with the tag identification code, and wherein the RFID tag mutually authenticates the RFID reader; and means for validating, at the RFID read device, the encrypted data received from the RFID tag by communicating with a tag processing service (TPS), wherein the encrypted data is decrypted using the tag security protocol maintained by the TPS, and wherein the validating is in response to the RFID read device authenticating the RFID tag.
-
-
25. A tag processing service (TPS) including a tangible, non-transitory memory having instructions stored thereon that, in response to execution by a computing device, cause the computing device to perform operations comprising:
-
receiving, by the TPS, a request from an RFID read device to validate encrypted data received by the RFID read device from an RFID tag, wherein the encrypted data is encrypted according to a tag security protocol associated with the RFID tag, and wherein the TPS receives the request in response to the RFID read device and the RFID tag mutually authenticating; obtaining, by the TPS, the tag security protocol from a certificates database; and transmitting validated data from the TPS to the RFID read device, wherein the TPS generates the validated data from the encrypted data using the tag security protocol associated with the RFID tag.
-
-
26. A tag processing service (TPS), comprising:
-
a network interface configured to receive a request from an RFID read device to validate encrypted data received by the RFID read device from an RFID tag, wherein the encrypted data is configured to be encrypted according to a tag security protocol associated with the RFID tag, and wherein the network interface is configured to receive the request in response to the RFID read device and the RFID tag mutually authenticating; and a certificates database configured to store the tag security protocol; wherein the network interface is configured to transmit validated data to the RFID read device, wherein the validated data is configured to be generated from the encrypted data using the tag security protocol associated with the RFID tag.
-
-
27. A tag processing service (TPS), comprising:
-
means for receiving, by the TPS, a request from an RFID read device to validate encrypted data received by the RFID read device from an RFID tag, wherein the encrypted data is encrypted according to a tag security protocol associated with the RFID tag, and wherein the TPS receives the request in response to the RFID read device and the RFID tag mutually authenticating; means for obtaining, by the TPS, the tag security protocol from a certificates database; and means for transmitting validated data from the TPS to the RFID read device, wherein the TPS generates the validated data from the encrypted data using the tag security protocol associated with the RFID tag.
-
Specification