RF transaction authentication using a random number
DCFirst Claim
1. A method comprising:
- generating, in a radio frequency identification (RFID) transaction device, an RFID transaction device authentication tag using a random number, a transaction device identifier, and a counter value, wherein the random number is received from an RFID reader;
transmitting the RFID transaction device authentication tag to the RFID reader; and
incrementing the counter value;
wherein an RFID transaction is authorized in response to verification of the RFID transaction device authentication tag.
5 Assignments
Litigations
1 Petition
Accused Products
Abstract
A system and method for securing Radio Frequency Identification (RFID) transactions is provided. An exemplary method includes using a random number in an authentication tag and authorizing an RF transaction in response to verifying the authentication tag. The method may also involve variously validating an RFID device authentication tag and an RFID reader authentication tag. Additionally, a system and method is disclosed for verifying an RFID transaction device and RFID reader operable with an RF transaction system. The method involves presenting an RFID device to an RFID reader, receiving a random number, creating an RFID transaction device authentication tag using the random number and a counter value, providing the RFID transaction device authentication tag to an RFID reader, creating an RFID reader authentication tag using the counter, random number, and RFID authentication tag, and providing the RFID reader authentication tag and RFID transaction device authentication tag for authentication.
-
Citations
18 Claims
-
1. A method comprising:
-
generating, in a radio frequency identification (RFID) transaction device, an RFID transaction device authentication tag using a random number, a transaction device identifier, and a counter value, wherein the random number is received from an RFID reader; transmitting the RFID transaction device authentication tag to the RFID reader; and incrementing the counter value; wherein an RFID transaction is authorized in response to verification of the RFID transaction device authentication tag. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
generating a random number at a radio frequency identification (RFID) reader; transmitting the random number to an RFID transaction device; and receiving, from the RFID transaction device, an RFID transaction device authentication tag, wherein the RFID transaction device authentication tag was generated using a transaction device identifier, a counter value, and the random number; wherein an RFID transaction is authorized in response to verification of the RFID transaction device authentication tag. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A radio frequency identification (RFID) transaction device comprising:
-
means for generating an RFID transaction device authentication tag using a random number, a transaction device identifier, and a counter value, wherein the random number is received from an RFID reader; means for transmitting the RFID transaction device authentication tag to the RFID reader; and means for incrementing the counter value; wherein an RFID transaction is authorized in response to verification of the RFID transaction device authentication tag.
-
-
18. A radio frequency identification (RFID) reader comprising:
-
means for generating a random number; means for transmitting the random number to an RFID transaction device; and means for receiving, from the RFID transaction device, an RFID transaction device authentication tag comprising a transaction device identifier, a counter value, and the random number; wherein an RFID transaction is authorized in response to verification of the RFID transaction device authentication tag.
-
Specification