Radio frequency identification secret handshakes
First Claim
1. A method for enabling communication between a tag and a reader configured to read the tag, the method comprising:
- determining, by at least one component associated with the tag, a pattern of movement of the tag;
comparing, by a microcontroller carried by the tag, the pattern of movement with a predefined pattern of movement, wherein comparing the pattern of movement with a predefined pattern of movement includes calculating a cross-correlation value of the pattern of movement with the predefined pattern of movement; and
activating the tag based on the comparison between the pattern of movement and the predefined pattern of movement;
wherein an instruction set used by the microcontroller for calculating the cross-correlation value of the pattern of movement with the predefined pattern of movement does not include a multiplication instruction.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach for defending radio frequency identification (RFID) tags and other contactless cards against ghost-and-leech (a.k.a. proxying, relay, or man-in-the-middle) attacks incorporates gesture recognition techniques directly implemented with the RFID tags or contactless cards. These tags or cards will only engage in wireless communications when they internally detect “secret handshakes.” A secret handshake recognition system is implemented on a passive WISP RFID tag having a built-in accelerometer. This approach is backward compatible with existing deployments of RFID tag and contactless card readers and is also designed to minimize the changes to the existing usage model of certain classes of RFID and contactless cards, such as access cards that are kept in a wallet or purse, by enabling execution of secret handshakes without removing the card. This novel approach can also improve the security and privacy properties in other uses of RFID tags, e.g., contactless payment cards.
32 Citations
15 Claims
-
1. A method for enabling communication between a tag and a reader configured to read the tag, the method comprising:
-
determining, by at least one component associated with the tag, a pattern of movement of the tag; comparing, by a microcontroller carried by the tag, the pattern of movement with a predefined pattern of movement, wherein comparing the pattern of movement with a predefined pattern of movement includes calculating a cross-correlation value of the pattern of movement with the predefined pattern of movement; and activating the tag based on the comparison between the pattern of movement and the predefined pattern of movement; wherein an instruction set used by the microcontroller for calculating the cross-correlation value of the pattern of movement with the predefined pattern of movement does not include a multiplication instruction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification