Contact-less tag with signature, and applications thereof
First Claim
1. A method for execution by a controller, comprising:
- receiving an encrypted signature from a tag associated with an item;
determining a dynamic parameter, the dynamic parameter being a current time or a current location of the controller;
obtaining a key based at least in part on the dynamic parameter;
decrypting the signature with the key to obtain an identifier;
validating the identifier by determining whether said signature has been previously received; and
performing an action related to identification of the item, based on the identifier and the validation.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, comprising: receiving an encrypted signature from a tag associated with an item; determining a dynamic parameter; obtaining a key based at least in part on the dynamic parameter; decrypting the signature with the key to obtain an identifier; and performing an action related to identification of the item, based on the identifier. Also, a system, comprising: a tag reader configured to receive an encrypted signature from a tag associated with an item; and a processing entity configured to (i) determine a dynamic parameter; (ii) obtain a key based at least in part on the dynamic parameter; (iii) decrypt the signature with the key to obtain an identifier; and (iv) perform an action related to identification of the item, based on the identifier.
-
Citations
16 Claims
-
1. A method for execution by a controller, comprising:
-
receiving an encrypted signature from a tag associated with an item; determining a dynamic parameter, the dynamic parameter being a current time or a current location of the controller; obtaining a key based at least in part on the dynamic parameter; decrypting the signature with the key to obtain an identifier; validating the identifier by determining whether said signature has been previously received; and performing an action related to identification of the item, based on the identifier and the validation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method, the computer-readable program code comprising:
-
first computer-readable program code for causing the computing apparatus to be attentive to receipt of an encrypted signature from a tag associated with an item; second computer-readable program code for causing the computing apparatus to determine a dynamic parameter, the dynamic parameter being a current time or a current location of the computing apparatus; third computer-readable program code for causing the computing apparatus to obtain a key based at least in part on the dynamic parameter; fourth computer-readable program code for causing the computing apparatus to decrypt the signature with the key to obtain an identifier; fifth computer readable program code for causing the computing apparatus to validate the identifier by determining whether said signature has been previously received; and sixth computer-readable program code for causing the computing apparatus to perform an action related to identification of the item, based on the identifier and the validation.
-
-
16. A system, comprising:
-
a tag reader configured to receive an encrypted signature from a tag associated with an item; and a processing entity configured to; determine a dynamic parameter; obtain a key based at least in part on the dynamic parameter, the dynamic parameter being a current time or a current location of the processing entity; decrypt the signature with the key to obtain an identifier; validating the identifier by determining whether said signature has been previously received; and perform an action related to identification of the item, based on the identifier and the validation.
-
Specification