Method and apparatus for providing security in a radio frequency identification system
First Claim
Patent Images
1. A radio frequency identification (RFID) tag, comprising:
- a receiver configured to receive wireless communications including an authentication request, the authentication request including a first digital certificate, a transient public key, a random number, and a list identifying at least one authentication technique; and
a memory, the memory storing a firmware module, the firmware module including a security shim, the security shim being configured to;
select an authentication technique from the list identifying at least one authentication technique;
determine whether the first digital certificate is in a trust relationship with a second digital certificate that is different from said first digital certificate and that is stored in the memory;
generate a second random number; and
encrypt, using the public key, said second random number and an authentication identification identifying the selected authentication technique; and
a transmitter configured to wirelessly transmit an authentication response, the authentication response including the encrypted second random number, the encrypted authentication identification, and entity information that includes a unique identification of said RFID tag.
1 Assignment
0 Petitions
Accused Products
Abstract
One aspect involves receiving by a tag of wireless communications that utilize a first security provision, and wireless communications that utilize a second security provision different from the first security provision. A different aspect involves receiving by an entity of an authentication request that is based on a first digital certificate unknown to the entity, and determining by the entity, without external authentication of the first digital certificate, whether the first digital certificate is in a trust relationship with a second digital certificate that is different from the first digital certificate and that is known to the entity.
74 Citations
11 Claims
-
1. A radio frequency identification (RFID) tag, comprising:
-
a receiver configured to receive wireless communications including an authentication request, the authentication request including a first digital certificate, a transient public key, a random number, and a list identifying at least one authentication technique; and a memory, the memory storing a firmware module, the firmware module including a security shim, the security shim being configured to; select an authentication technique from the list identifying at least one authentication technique; determine whether the first digital certificate is in a trust relationship with a second digital certificate that is different from said first digital certificate and that is stored in the memory; generate a second random number; and encrypt, using the public key, said second random number and an authentication identification identifying the selected authentication technique; and a transmitter configured to wirelessly transmit an authentication response, the authentication response including the encrypted second random number, the encrypted authentication identification, and entity information that includes a unique identification of said RFID tag. - View Dependent Claims (2, 3, 4)
-
-
5. A method of operating an RFID tag having a protocol residing in a security shim in memory, comprising:
-
receiving, by said RFID tag, a wireless communication of an authentication request from an RFID interrogator, the authentication request including a first digital certificate unknown to said RFID tag, a transient public key, a random number, and a list identifying at least one authentication technique; selecting, by the RFID tag, an authentication technique from the list identifying at least one authentication technique; determining, by said RFID tag, without external authentication of said first digital certificate, whether said first digital certificate is in a trust relationship with a second digital certificate that is different from said first digital certificate and that is known to said RFID tag. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
Specification