System and method for authenticating RFID tags
First Claim
1. A method of enabling a radio frequency identification (RFID) tag to be authenticated, the method comprising:
- generating a plurality i of digital signatures using a digital signature scheme providing message recovery,wherein each digital signature comprises a recoverable first signature component generated from a hidden message portion Hi comprising a concatenation of respective index value i unique to that digital signature and a hidden message portion value H, and a second signature component generated from the hidden message portion Hi and a visible message portion Vi; and
,storing the plurality of digital signatures with the corresponding visible message portions Vi on the RFID tag in association with the respective index values i to enable a desired digital signature and visible message portion Vi to be selected according to a provided index value;
wherein the hidden message portion Hi of the selected digital signature is recoverable from the first signature component.
8 Assignments
0 Petitions
Accused Products
Abstract
A system and method of providing authenticity to a radio frequency identification (RFID) tag are provided. The method comprises generating a plurality of digital signatures, wherein each digital signature is generated using an index value unique to that digital signature and using information associated with the RFID tag; and storing the plurality of digital signatures on the RFID tag in association with respective index values to enable a desired digital signature to be selected according to a provided index value. Also provided are a system and method of enabling an RFID reader to authenticate an RFID tag, which utilize a challenge comprising an index value to request one of the stored signature and authenticating same. Also provided is an RFID tag that is configured to participate in the challenge-response protocol.
19 Citations
16 Claims
-
1. A method of enabling a radio frequency identification (RFID) tag to be authenticated, the method comprising:
-
generating a plurality i of digital signatures using a digital signature scheme providing message recovery, wherein each digital signature comprises a recoverable first signature component generated from a hidden message portion Hi comprising a concatenation of respective index value i unique to that digital signature and a hidden message portion value H, and a second signature component generated from the hidden message portion Hi and a visible message portion Vi; and
,storing the plurality of digital signatures with the corresponding visible message portions Vi on the RFID tag in association with the respective index values i to enable a desired digital signature and visible message portion Vi to be selected according to a provided index value; wherein the hidden message portion Hi of the selected digital signature is recoverable from the first signature component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of authenticating an RFID tag, the method comprising:
-
randomly selecting an index value from a predefined range of index values; generating a challenge comprising the selected index value; providing the challenge to the RFID tag to enable the RFID tag to determine a corresponding digital signature stored thereon in association with the selected index value, wherein each digital signature comprises a recoverable first signature component generated from the hidden message portion Hi comprising a concatenation of a respective index value i unique to that digital signature and a hidden message portion value H, and a second signature component generated from the hidden message portion Hi and a visible message portion Vi; obtaining a response from the RFID tag, the response comprising the corresponding digital signature; and authenticating the RFID tag using the corresponding digital signature by verifying the second signature component, and recovering the hidden message portion Hi from the recoverable first signature component and verifying that the hidden message portion Hi has a pre-determined amount of redundancy. - View Dependent Claims (10)
-
-
11. An RFID reader configured for authenticating a RFID tag, the RFID reader comprising a cryptographic processor, a memory, and an interface for establishing a communicable connection to the RFID tag, the memory comprising computer executable instructions for causing the processor to authenticate the RFID tag by:
-
randomly selecting an index value from a predefined range of index values; generating a challenge comprising the selected index value; providing the challenge to the RFID tag to enable the RFID tag to determine a corresponding digital signature stored thereon in association with the selected index value, wherein each digital signature comprises a recoverable first signature component generated from a hidden message portion Hi comprising a concatenation of a respective index value i unique to that digital signature and a hidden message portion value H, and a second signature component generated from the hidden message portion Hi and a visible message portion Vi; obtaining a response from the RFID tag, the response comprising the corresponding digital signature; and authenticating the RFID tag using the corresponding digital signature by verifying the second signature component, and recovering the hidden message portion Hi from the first signature component and verifying that the hidden message portion Hi has a pre-determined amount of redundancy. - View Dependent Claims (12, 13)
-
-
14. A method of enabling an RFID reader to authenticate an RFID tag, the method comprising:
-
receiving a challenge from the RFID reader, the challenge comprising challenge index value randomly selected by the RFID reader from a predefined range of index values; obtaining a requested digital signature from a plurality of digital signatures each being stored on the RFID tag in association with a respective index value, the requested digital signature corresponding to the index value provided by the RFID reader, wherein each digital signature comprises a recoverable first signature component generated from a hidden message portion Hi comprising a concatenation of a respective index value i unique to that digital signature and a hidden message portion value H, and a second signature component generated from the hidden message portion Hi and a visible message portion Vi; and providing a response to the RFID reader comprising the digital signature corresponding to the received challenge index value to enable the RFID reader to authenticate the RFID tag signature by verifying the second signature component, and recovering the hidden message portion Hi from the recoverable first signature component and verifying that the hidden message portion Hi has a pre-determined amount of redundancy. - View Dependent Claims (15, 16)
-
Specification