Radio frequency identification (RFID) based authentication system and methodology
First Claim
1. A radio frequency identification (RFID) authentication system comprising:
- a RFID tag associated with a user, said RFID tag comprising a first memory storing a private key and a RFID tag antenna connected to said first memory, said RFID tag antenna transmitting said private key, when activated;
a RFID reader comprising a RFID reader antenna activating said RFID tag antenna and receiving said private key; and
a computer system in communication with said RFID reader, said computer system comprising;
a processor; and
a second memory accessible by said processor, said second memory storing encrypted data, said encrypted data being encrypted with a public key related to said private key, said processor further using said private key, as transmitted by said RFID tag antenna of said RFID tag to said RFID reader antenna of said RFID reader, to decrypt said encrypted data in order to generate decrypted data, said decrypted data comprising a password required for access by said user to a secured domain, and said computer system further automatically providing said user with access to said secured domain using said password.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are embodiments of a radio frequency identification (RFID) authentication system and an associated authentication methodology. The embodiments incorporate an identification device (e.g., an identification badge, a key fob, etc.) with an embedded RFID tag. The embedded RFID tag is associated with a specific user and stores a private key generated as part of a public key-private key encryption scheme. The private key is read by an RFID reader and used to decode public key encrypted data stored within or accessible by a computer system (e.g., a desktop computer system, a laptop computer system, a personal digital assistant (PDA), a digital fax machine, wireless telephone, etc.). Thus, the embodiments provide a portable way to use public key-private key encryption scheme data anywhere using RFID technology.
32 Citations
21 Claims
-
1. A radio frequency identification (RFID) authentication system comprising:
-
a RFID tag associated with a user, said RFID tag comprising a first memory storing a private key and a RFID tag antenna connected to said first memory, said RFID tag antenna transmitting said private key, when activated; a RFID reader comprising a RFID reader antenna activating said RFID tag antenna and receiving said private key; and a computer system in communication with said RFID reader, said computer system comprising; a processor; and a second memory accessible by said processor, said second memory storing encrypted data, said encrypted data being encrypted with a public key related to said private key, said processor further using said private key, as transmitted by said RFID tag antenna of said RFID tag to said RFID reader antenna of said RFID reader, to decrypt said encrypted data in order to generate decrypted data, said decrypted data comprising a password required for access by said user to a secured domain, and said computer system further automatically providing said user with access to said secured domain using said password. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A radio frequency identification (RFID) authentication method comprising:
-
activating an RFID tag antenna of an RFID tag associated with a user such that said RFID tag antenna of said RFID tag transmits a private key stored in a first memory of said RFID tag; receiving, by an RFID antenna of an RFID reader, said private key; and using, by a computer system in communication with said RFID reader, said private key to decrypt encrypted data in order to generate decrypted data, said encrypted data being encrypted using a public key related to said private key and further being stored in a second memory accessible by said computer system, said decrypted data comprising a password required for access by said user to a secured domain; and automatically providing, by said computer system, said user with access to said secured domain using said password. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A radio frequency identification (RFID) authentication system comprising:
-
a RFID tag associated with a user, said RFID tag comprising a first memory storing a private key and a RFID tag antenna connected to said first memory, said RFID tag antenna transmitting said private key over a private radio frequency, when activated; a RFID reader comprising a RFID reader antenna activating said RFID tag antenna and receiving said private key; and a computer system in communication with said RFID reader, said computer system comprising; a processor; a second memory accessible by said processor, said second memory storing an encrypted password, said encrypted password being encrypted with a public key related to said private key, and said processor further using said private key, as transmitted by said RFID tag antenna to said RFID reader, to decrypt said encrypted password in order to generate a decrypted password; and a user interface in communication with said processor, said user interface prompting said user to enter an unencrypted password and said processor further comparing said unencrypted password, as entered by said user through said user interface, to said decrypted password in order to authenticate said user, said decrypted password being a specific password required for access by said user to a secured domain and said computer system further receiving a request by said user for access to said secured domain and, once said user is authenticated, automatically providing said user with access to said secured domain using said specific password. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A radio frequency identification (RFID) authentication method comprising:
-
activating an RFID tag antenna of an RFID tag associated with a user such that said RFID tag antenna of said RFID tag transmits, over a private radio frequency, a private key stored in a first memory of said RFID tag; receiving, by an RFID reader antenna of an RFID reader, said private key; using, by a computer system in communication with said RFID reader, said private key to decrypt an encrypted password in order to generate a decrypted password, said encrypted password being encrypted using a public key related to said private key and being stored in a second memory accessible by said computer system; prompting, by said computer system, said user to enter an unencrypted password; and comparing, by said computer system, said unencrypted password, as entered by said user, to said decrypted password in order to authenticate said user, said decrypted password being a specific password required for access by said user to a secured domain and said method further comprising receiving a request by said user for access to said secured domain and, once said user is authenticated, automatically providing said user with access to said secured domain using said specific password. - View Dependent Claims (19, 20, 21)
-
Specification