Method and apparatus for providing security in a radio frequency identification system
First Claim
Patent Images
1. A Radio Frequency Identification (RFID) tag comprising:
- a processor within the tag;
a radio frequency receiver within the tag and coupled to the processor, the radio frequency receiver configured to receive a wireless radio frequency communication conforming to a predetermined protocol, the wireless radio frequency communication including an encrypted payload consistent with the predetermined protocol and subject to a security provision; and
a memory within the tag and coupled to the processor, the memory including a security shim, the security shim configured to decrypt the encrypted payload;
wherein said communication has a portion separate from said encrypted payload containing a first command that is a command from said predetermined protocol;
wherein said encrypted payload includes at least a portion of a further communication containing a second command that is a command from said predetermined protocol;
wherein said first command is one of a subset of commands of said predetermined protocol, said subset containing less than all of the commands of said predetermined protocol;
wherein the security shim maintains a virtual object, said first command specifying said virtual object as a destination for said encrypted payload; and
wherein the tag further comprises a transmitter, the transmitter configured to respond to said second command by transmitting a further communication for propagation away from the tag externally thereof, said further communication including tag response information that is subject to a further security provision.
1 Assignment
0 Petitions
Accused Products
Abstract
A part can receive a communication that originates externally of the part, that conforms to a predetermined communications protocol, and that contains payload information consistent with the protocol but subject to a security provision supplemental to the protocol. The part extracts the payload information from the security provision.
129 Citations
6 Claims
-
1. A Radio Frequency Identification (RFID) tag comprising:
-
a processor within the tag; a radio frequency receiver within the tag and coupled to the processor, the radio frequency receiver configured to receive a wireless radio frequency communication conforming to a predetermined protocol, the wireless radio frequency communication including an encrypted payload consistent with the predetermined protocol and subject to a security provision; and a memory within the tag and coupled to the processor, the memory including a security shim, the security shim configured to decrypt the encrypted payload; wherein said communication has a portion separate from said encrypted payload containing a first command that is a command from said predetermined protocol; wherein said encrypted payload includes at least a portion of a further communication containing a second command that is a command from said predetermined protocol; wherein said first command is one of a subset of commands of said predetermined protocol, said subset containing less than all of the commands of said predetermined protocol; wherein the security shim maintains a virtual object, said first command specifying said virtual object as a destination for said encrypted payload; and wherein the tag further comprises a transmitter, the transmitter configured to respond to said second command by transmitting a further communication for propagation away from the tag externally thereof, said further communication including tag response information that is subject to a further security provision. - View Dependent Claims (2)
-
-
3. A Radio Frequency Identification (RFID) tag, comprising:
-
a processor; a receiver coupled to the processor, the receiver configured to receive a wireless communication conforming to a predetermined protocol, the wireless communication including payload information consistent with the predetermined protocol and subject to a security provision; and a memory coupled to the processor, the memory including a security shim, the security shim configured to decrypt the encrypted payload, wherein said communication has a portion separate from said encrypted payload containing one of first and second commands that are respective different commands from said predetermined protocol; wherein said encrypted payload includes at least a portion of a further communication containing a third command that is a command from said predetermined protocol; wherein said memory comprises first and second tables; wherein the security shim responds to said communication by storing said encrypted payload in said first table if said portion of said communication contains said first command; and wherein the security shim responds to said communication by storing said encrypted payload in said second table if said portion of said communication contains said second command. - View Dependent Claims (4, 5, 6)
-
Specification