Method, transponder, and system for secure data exchange
First Claim
1. A method comprising:
- transmitting a first code, by a transponder, in response to receiving a first request from a base station;
receiving first encoded transmission information from the base station, the first encoded transmission information comprising a base station code encoded using the first code and a first identification;
extracting the base station code from the first encoded transmission information using the first code and the first identification;
transmitting a second code in response to receiving a second request from the base station, the second code encoded using the extracted base station code;
receiving second encoded transmission information from the base station, the second encoded transmission information comprising a second identification encoded by the base station using the second code;
extracting the second identification from the second encoded transmission information using the second code; and
comparing the extracted second identification to a stored version of the second identification, access toat least one memory region of the transponder provided based on the comparing of the extracted second identification.
11 Assignments
0 Petitions
Accused Products
Abstract
A method for data exchange is provided, whereby a first code is generated by a transponder, which is transmitted to a base station, a first transmission information is generated by the base station by encoding a base station code with a first identification and the first random number code, the first transmission information is transmitted to the transponder and the base station code is extracted by the transponder, a second code is generated by the transponder, which is transmitted to the base station upon an associated request from the base station, whereby before a transmission to the base station the second code is encoded with the extracted base station code, a second encoded transmission information comprising a second identification is generated by the base station with use of the second code and transmitted to the transponder, and at least one memory region of the transponder is released for read and/or write access after the second identification was verified as valid. The invention relates further to a transponder and to a system for secure data exchange.
11 Citations
20 Claims
-
1. A method comprising:
-
transmitting a first code, by a transponder, in response to receiving a first request from a base station; receiving first encoded transmission information from the base station, the first encoded transmission information comprising a base station code encoded using the first code and a first identification; extracting the base station code from the first encoded transmission information using the first code and the first identification; transmitting a second code in response to receiving a second request from the base station, the second code encoded using the extracted base station code; receiving second encoded transmission information from the base station, the second encoded transmission information comprising a second identification encoded by the base station using the second code; extracting the second identification from the second encoded transmission information using the second code; and comparing the extracted second identification to a stored version of the second identification, access to at least one memory region of the transponder provided based on the comparing of the extracted second identification. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A circuit configured to:
-
transmit a first code, by a transponder, in response to receiving a first request from a base station; receive first encoded transmission information from the base station, the first encoded transmission information comprising a base station code encoded using the first code and a first identification; extract the base station code from the first encoded transmission information using the first code and the first identification; transmit a second code in response to receiving a second request from the base station, the second code encoded using the extracted base station code; receive second encoded transmission information, from the base station, the second encoded transmission information comprising a second identification encoded using the second code; extract the second identification from the second encoded transmission information using the second code; and compare the extracted second information to a stored version of the second identification, access to at least one memory region of the transponder provided based on the comparing of the extracted second identification. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. An apparatus comprising:
-
a memory area; and one or more computer-readable non-transitory storage media coupled to memory area that embody logic that is configured when executed to; transmit a first code by a transponder in response to receiving a request from a base station; receive first encoded transmission information from the base station, the first encoded transmission information comprising a base station code encoded using the first code and a first identification; extract the base station code from the first encoded transmission using the first code and the first identification; transmit a second code in response to receiving a second request from the base station, the second code encoded using the extracted base station code; receive second encoded transmission information from the base station, the second encoded information comprising a second identification encoded by the base station using the second code; extract the second identification is extracted by the transponder from the second encoded transmission information and verified, and compare the extracted second identification to a stored version of the second identification, access to at least one memory region provided based on the comparing of the extracted second identification. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification