RFID protocols with non-interacting variants
First Claim
Patent Images
1. A method for operating an RFID tag, the method comprising:
- receiving, at a tag, a query command from a reader;
receiving, at the tag, a first key value from the reader;
comparing, in response to the query command, the first key value from the reader to a first key value stored in the tag;
transmitting a first value from the tag to the reader if the first key value from the reader matches the first key value stored in the tag;
receiving, at the tag, a second value and decrypting the second value, using a second key value stored in the tag to derive a challenge value;
comparing, at the tag, the challenge value to the first value; and
transmitting an identifier from the tag if the comparing indicates that the first value matches the challenge value.
5 Assignments
0 Petitions
Accused Products
Abstract
In an RFID system having at least one tag and at least one reader, a tag and a reader can, in one embodiment, use a pair of keys, known to both the tag and the reader, to restrict the interaction of the tag and the reader so that tags having the pair of keys interact only with readers that use the pair of keys.
-
Citations
18 Claims
-
1. A method for operating an RFID tag, the method comprising:
-
receiving, at a tag, a query command from a reader; receiving, at the tag, a first key value from the reader; comparing, in response to the query command, the first key value from the reader to a first key value stored in the tag; transmitting a first value from the tag to the reader if the first key value from the reader matches the first key value stored in the tag; receiving, at the tag, a second value and decrypting the second value, using a second key value stored in the tag to derive a challenge value; comparing, at the tag, the challenge value to the first value; and transmitting an identifier from the tag if the comparing indicates that the first value matches the challenge value. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A machine readable non-transitory storage medium which contains executable instructions which when executed by a tag cause the tag to perform a method for operating an RFID tag, the method comprising:
-
receiving, at a tag, a query command from a reader; receiving, at the tag, a first key value from the reader; comparing, in response to the query command, the first key value from the reader to a first key value stored in the tag; transmitting a first value from the tag to the reader if the first key value from the reader matches the first key value stored in the tag; receiving, at the tag, a second value and decrypting the second value, using a second key value stored in the tag to derive a challenge value; comparing, at the tag, the challenge value to the first value; and transmitting an identifier from the tag if the comparing indicates that the first value matches the challenge value. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A tag, comprising
a memory; -
a processor coupled to the memory, wherein the processor is configured to receive a query command from a reader, wherein the processor is configured to receive a first key value from the reader, wherein the processor is configured to compare, in response to the query command, the first key value from the reader to a first key value stored in the tag, wherein the processor is configured to transmit a first value from the tag to the reader if the first key value from the reader matches the first key value stored in the tag, wherein the processor is configured to receive a second value and to decrypt the second value, using a second key value stored in the tag to derive a challenge value, wherein the processor is configured to compare the challenge value to the first value; and wherein the processor is configured to transmit an identifier from the tag if the comparing indicates that the first value matches the challenge value. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification