RFID reader controllers limiting theft of confidential information
First Claim
Patent Images
1. A method for limiting theft of confidential information from a Radio Frequency Identification (RFID) reader configured to exchange wireless transmissions with an RFID tag and communicate with a controller, the method comprising:
- determining, at the controller, an authorization status of the reader for issuing the confidential information; and
if the reader is not authorized, the controller performing at least one of;
instructing the reader to limit an operational aspect of the reader associated with issuing the confidential information, anddisabling the reader'"'"'s authorization to issue the confidential information to the tag.
1 Assignment
0 Petitions
Accused Products
Abstract
An RFID reader controller and methods of controlling an RFID reader by an RFID reader controller are provided to limit or prevent the issuing of confidential information such as encryption keys, passwords, shared secrets, and the like to RFID tags if a reader is not authorized. A controller may determine the authorization status of a reader and limit its communication with the reader or instruct the reader to limit an operational aspect of the reader.
20 Citations
22 Claims
-
1. A method for limiting theft of confidential information from a Radio Frequency Identification (RFID) reader configured to exchange wireless transmissions with an RFID tag and communicate with a controller, the method comprising:
-
determining, at the controller, an authorization status of the reader for issuing the confidential information; and if the reader is not authorized, the controller performing at least one of; instructing the reader to limit an operational aspect of the reader associated with issuing the confidential information, and disabling the reader'"'"'s authorization to issue the confidential information to the tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A controller communicating with a Radio Frequency Identification (RFID) reader, the reader configured to exchange wireless transmissions with an RFID tag, the controller comprising:
-
a communication module configured to communicate with the reader through one of a wired and wireless medium; and a processing block coupled to the communication module, the processing block configured to; determine an authorization status of the reader for issuing confidential information; and if the reader is not authorized, perform at least one of; instructing the reader to limit an operational aspect of the reader associated with issuing the confidential information, and disabling the reader'"'"'s authorization to issue the confidential information to the tag. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium with instructions stored thereon for limiting theft of confidential information from a Radio Frequency Identification (RFID) reader, the reader configured to exchange wireless transmissions with an RFID tag and communicate with the controller, the instructions comprising:
determining, at the controller, an authorization status of the reader for issuing the confidential information; and
if the reader is not authorized, performing at least one of;instructing the reader to limit an operational aspect of the reader associated with issuing the confidential information, and disabling the reader'"'"'s authorization to issue the confidential information to the tag. - View Dependent Claims (21, 22)
Specification