Radio frequency identification (RFID) based authentication methodology using standard and private frequency RFID tags
First Claim
1. A radio frequency identification (RFID) authentication system comprising:
- a RFID device comprising;
a first RFID tag comprising;
a first integrated circuit device storing an encrypted identifier for a specific user, said encrypted identifier encrypted with a public key; and
a first RFID tag antenna connected to said first integrated circuit device, said first RFID tag antenna transmitting said encrypted identifier, when activated; and
a second RFID tag comprising;
a second integrated circuit device storing a private key; and
a second RFID tag antenna connected to said second integrated circuit device, said second RFID tag antenna transmitting said private key, when activated,said first RFID tag antenna operating at a first radio frequency and said second RFID tag antenna operating at a second radio frequency different from said first radio frequency and having restricted use relative to said first radio frequency; and
a RFID reader comprising a first RFID reader antenna for activating said first RFID tag antenna and second RFID reader antenna for activating said second RFID tag antenna.
5 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a self-contained hardware-based authentication system that incorporates different authentication protocols for access to soft and/or hard assets with different security levels. The system embodiments include the use of a RFID device that comprises dual RFID tags operating under different frequencies. Specifically, one RFID tag operates on a public frequency and, when activated, transmits an identifier encrypted using a public key. The other RFID tag operates on a private frequency and, when activated, transmits a private key that can be used to decrypt the encrypted identifier. Upon receipt by a processor (e.g., a local processor or security server) of a request for access to a specific asset, a security level for the specific asset is determined. Then, depending upon the particular security level (e.g., low, medium or high) different authentication protocols are instituted using the RFID device. Also disclosed are embodiments of an associated authentication methodology.
-
Citations
24 Claims
-
1. A radio frequency identification (RFID) authentication system comprising:
a RFID device comprising; a first RFID tag comprising; a first integrated circuit device storing an encrypted identifier for a specific user, said encrypted identifier encrypted with a public key; and a first RFID tag antenna connected to said first integrated circuit device, said first RFID tag antenna transmitting said encrypted identifier, when activated; and a second RFID tag comprising; a second integrated circuit device storing a private key; and a second RFID tag antenna connected to said second integrated circuit device, said second RFID tag antenna transmitting said private key, when activated, said first RFID tag antenna operating at a first radio frequency and said second RFID tag antenna operating at a second radio frequency different from said first radio frequency and having restricted use relative to said first radio frequency; and a RFID reader comprising a first RFID reader antenna for activating said first RFID tag antenna and second RFID reader antenna for activating said second RFID tag antenna. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A radio frequency identification (RFID) authentication method comprising:
receiving a request by a specific user for access to a specific asset, said specific user having a RFID device, said RFID device comprising; a first RFID tag comprising; a first integrated circuit device storing an encrypted identifier for said specific user, said encrypted identifier encrypted with a public key; and a first RFID tag antenna connected to said first integrated circuit device, said first RFID tag antenna transmitting said encrypted identifier, when activated; and a second RFID tag comprising; a second integrated circuit device storing a private key; and a second RFID tag antenna connected to said second integrated circuit device, said second RFID tag antenna transmitting said private key, when activated; determining a security level associated with said specific asset; and depending upon said security level, performing at least one level of user authentication using said RFID device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A non-transitory computer usable medium having computer usable program code embodied therewith, said computer program code being readable by a computerized device and causing said computerized device to execute a method for performing radio frequency identification (RFID) authentication, said method comprising:
receiving a request by a specific user for access to a specific asset, said specific user having a RFID device, said RFID device comprising; a first RFID tag comprising; a first integrated circuit device storing an encrypted identifier for said specific user, said encrypted identifier encrypted with a public key; and a first RFID tag antenna connected to said first integrated circuit device, said first RFID tag antenna transmitting said encrypted identifier, when activated; and a second RFID tag comprising; a second integrated circuit device storing a private key; and a second RFID tag antenna connected to said second integrated circuit device, said second RFID tag antenna transmitting said private key, when activated; determining a security level associated with said specific asset; and depending upon said security level, performing at least one level of user authentication using said RFID device. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
Specification