Using promiscuous and non-promiscuous data to verify card and reader identity
First Claim
Patent Images
1. An access control system, comprising:
- (a) one or more radio frequency identification (RFID) devices, each RFID device including a memory comprising promiscuous and non-promiscuous regions,(i) said promiscuous region including data comprising at least one of manufacturer data, configuration data and general non-secure data;
(ii) said non-promiscuous region including at least one of manufacturer data, configuration data, shared-secret data and holder data;
(b) one or more radio frequency (RF) interrogators (readers), said readers transmitting an RF signal to create an active RF zone around said readers; and
wherein, when an RFID device is positioned in an active zone of a reader, data stored in the promiscuous region is first transmitted from the RFID device to the reader in response to the RFID device being excited by the RF signal transmitted by the reader and in the absence of receiving a request for data command from the reader, data from the non-promiscuous region is randomly selected by the reader and selectively transmitted to the reader only upon a challenge initiated by the reader for data from a random non-promiscuous memory location, wherein the challenge comprises a series of challenges each of which identify a different randomly selected memory segment in the non-promiscuous region.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for authenticating radio frequency identification (RFID) devices and validating readers of the RFID devices are disclosed. Embodiments of the invention use RFID devices adapted for storing data in a form of data segments selectively associated with promiscuous and non-promiscuous regions of their memories and monitor algorithmic, computational, communicational, or tampered errors of the readers.
-
Citations
30 Claims
-
1. An access control system, comprising:
-
(a) one or more radio frequency identification (RFID) devices, each RFID device including a memory comprising promiscuous and non-promiscuous regions, (i) said promiscuous region including data comprising at least one of manufacturer data, configuration data and general non-secure data; (ii) said non-promiscuous region including at least one of manufacturer data, configuration data, shared-secret data and holder data; (b) one or more radio frequency (RF) interrogators (readers), said readers transmitting an RF signal to create an active RF zone around said readers; and wherein, when an RFID device is positioned in an active zone of a reader, data stored in the promiscuous region is first transmitted from the RFID device to the reader in response to the RFID device being excited by the RF signal transmitted by the reader and in the absence of receiving a request for data command from the reader, data from the non-promiscuous region is randomly selected by the reader and selectively transmitted to the reader only upon a challenge initiated by the reader for data from a random non-promiscuous memory location, wherein the challenge comprises a series of challenges each of which identify a different randomly selected memory segment in the non-promiscuous region. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 14)
-
-
9. A method for validating components in an access control system, comprising:
-
(a) providing a population of radio frequency identification (RFID) devices, said RFID devices including a memory comprising promiscuous and non-promiscuous regions, and at least one radio frequency (RF) interrogator (reader), wherein said promiscuous region includes data that is common across two or more RFID devices in the population of RFID devices and the data comprises at least one of manufacturer data, configuration data and general non-secure data and said non-promiscuous region includes data comprising at least one of configuration data, shared-secret data and holder data; (b) said at least one reader transmitting an RF signal to create an active RF zone around said at least one reader; (c) positioning at least one RFID device into said active zone; (d) in response to positioning said at least one RFID device into said active zone and in the absence of a challenge for data, detecting, by said reader, data stored in said promiscuous region of said at least one RFID device; (e) determining contents of said detected data correspond to at least one of said manufacturer data, configuration data, and general non-secure data; (f) requesting, via a first challenge initiated by the reader, a first portion of random data from the non-promiscuous region of the RFID device, wherein the first portion of random data is selectively requested of the RFID device by the reader; and (g) requesting, via a second challenge initiated by the reader, a second portion of random data from the non-promiscuous region of the RFID device, wherein the second portion of random data is selectively requested of the RFID device by the reader. - View Dependent Claims (10, 11, 12, 13)
-
-
15. A radio frequency identification (RFID) device, comprising:
-
an antenna for communicating with a radio frequency (RF) enabled interrogator; a memory comprising; a promiscuous region comprising general non-secure data; and a non-promiscuous region comprising at least one of manufacturer data, configuration data, shared-secret data, and holder data; and wherein data from the promiscuous region is promiscuously transmitted by the RFID device to the reader when the RFID device is disposed in an active zone of the reader and in the absence of the reader sending a request for data command to the RFID device, and wherein data from said non-promiscuous region is randomly accessible and selectively transmitted to an RF enabled device only upon a request initiated by said RF enabled device, wherein the request initiated by the RF enabled device comprises a series of requests each of which identifies a different segment of the non-promiscuous region randomly selected to be challenged by the RF enabled device. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification