RFID authentication architecture and methods for RFID authentication
First Claim
Patent Images
1. A method for mutual authentication in a radio frequency identification (RFID) system comprising an RFID reader and an RFID tag, the method comprising:
- requesting an identifier from the RFID tag;
receiving the identifier;
selecting a password based at least in part on the identifier;
selecting a first of a plurality of indexed mathematical kernels, wherein the first mathematical kernel comprises a first parameter set;
using the first mathematical kernel to generate a first password keyencrypting the password using the first password key; and
transmitting the password encrypted using the first password key to the RFID tag.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising requesting an identification from the tag, receiving the identification, using the received identification to select a password associated with the identification, generating a password key based on the selected password, encrypting the selected password using the password key, and transmitting the encrypted password to the tag.
-
Citations
22 Claims
-
1. A method for mutual authentication in a radio frequency identification (RFID) system comprising an RFID reader and an RFID tag, the method comprising:
-
requesting an identifier from the RFID tag; receiving the identifier; selecting a password based at least in part on the identifier; selecting a first of a plurality of indexed mathematical kernels, wherein the first mathematical kernel comprises a first parameter set; using the first mathematical kernel to generate a first password key encrypting the password using the first password key; and transmitting the password encrypted using the first password key to the RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising;
-
providing an identifier to the RFID reader; in response to the identifier, receiving, from the RFID reader, a password encrypted using a first password key generated using a first of a plurality of indexed mathematical kernels, wherein the first mathematical kernel comprises a first parameter set; verifying the password encrypted using the first password key; in response to successfully verifying the password encrypted using the first password key, transmitting a first acknowledgement (ACK) to the RFID reader; receiving, from the RFID reader, a read memory request in response to the first ACK; and transmitting at least a portion of the data stored at the RFID tag to the RFID reader in response to the read memory request. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification