×

Using promiscuous and non-promiscuous data to verify card and reader identity

  • US 8,322,608 B2
  • Filed: 08/14/2006
  • Issued: 12/04/2012
  • Est. Priority Date: 08/15/2005
  • Status: Active Grant
First Claim
Patent Images

1. An access control system, comprising:

  • (a) one or more radio frequency identification (RFID) devices, each RFID device including a memory comprising promiscuous and non-promiscuous regions,(i) said promiscuous region including data comprising at least one of manufacturer data, configuration data and general non-secure data;

    (ii) said non-promiscuous region including at least one of manufacturer data, configuration data, shared-secret data and holder data;

    (b) one or more radio frequency (RF) interrogators (readers), said readers transmitting an RF signal to create an active RF zone around said readers; and

    wherein, when an RFID device is positioned in an active zone of a reader, data stored in the promiscuous region is first transmitted from the RFID device to the reader in response to the RFID device being excited by the RF signal transmitted by the reader and in the absence of receiving a request for data command from the reader, data from the non-promiscuous region is randomly selected by the reader and selectively transmitted to the reader only upon a challenge initiated by the reader for data from a random non-promiscuous memory location, wherein the challenge comprises a series of challenges each of which identify a different randomly selected memory segment in the non-promiscuous region.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×