RFID secure authentication
First Claim
Patent Images
1. A method of authenticating an RFID tag, comprising:
- selecting a secret key;
preparing the RFID tag, wherein preparing the RFID tag comprises;
reading a unique identification code from the RFID tag;
creating an authentication signature by encrypting the secret key with the unique identification code; and
setting a password of the RFID tag to the authentication signature; and
authenticating the RFID tag, wherein authenticating the RFID tag comprises;
reading the unique identification code from the RFID tag;
re-creating the authentication signature by encrypting the secret key with the unique identification code;
attempting to access a function of the RFID tag by providing the authentication signature to the RFID tag as the password; and
determining that the RFID tag is authentic if the attempt to access a function of the RFID tag is successful.
1 Assignment
0 Petitions
Accused Products
Abstract
Authentication systems and methods for a population of devices each associated with an RFID tag are described. For each device, a secret key is combined cryptographically with a publicly-readable unique identifier (UID) of an RFID tag to obtain a unique authorization signature. The RFID tag is prepared utilizing the unique authorization signature as memory-access and/or tag-operation password(s). The systems and methods may safeguard against attacks whereby compromise of a single tag will not compromise the entire population of devices and may reduce or eliminate the use of inappropriate surgical devices during a surgical procedure.
80 Citations
20 Claims
-
1. A method of authenticating an RFID tag, comprising:
- selecting a secret key;
preparing the RFID tag, wherein preparing the RFID tag comprises; reading a unique identification code from the RFID tag; creating an authentication signature by encrypting the secret key with the unique identification code; and setting a password of the RFID tag to the authentication signature; and
authenticating the RFID tag, wherein authenticating the RFID tag comprises;reading the unique identification code from the RFID tag; re-creating the authentication signature by encrypting the secret key with the unique identification code; attempting to access a function of the RFID tag by providing the authentication signature to the RFID tag as the password; and determining that the RFID tag is authentic if the attempt to access a function of the RFID tag is successful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
- selecting a secret key;
-
9. A system for preparing a surgical instrument for use in an electrosurgical procedure, comprising:
a surgical instrument having an RFID tag, wherein the RFID tag comprises; a unique identifier readable by a preparation unit; and a password module configured to store a password and to return a status indicating whether a proffered password is equal to the stored password; and
a preparation unit, comprising;an RFID communication unit; a processor operably coupled to the RFID communication unit; and a memory operably coupled to the processor storing a secret key and having a set of instructions for; reading the unique identifier of the RFID tag of the surgical instrument; generating an authentication signature based at least in part upon encrypting the secret key with the unique identifier of the RFID tag of the surgical instrument; and storing the authentication signature as a password in the password module. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
16. A system for authenticating a surgical instrument for use during an electrosurgical procedure, comprising:
-
a surgical instrument having an RFID tag, wherein the RFID tag comprises; a unique identifier readable by an authentication unit; and a password module storing a password and configured to return a status indicating whether a proffered password is equal to the stored password; and an authentication unit, comprising; an RFID communication unit; a processor operably coupled to the RFID communication unit; and a memory operably coupled to the processor storing a secret key and having a set of instructions for; reading the unique identifier of the RFID tag of the surgical instrument; generating an authentication signature based at least in part upon encrypting the secret key with the unique identifier of the RFID tag of the surgical instrument; proffering the authentication signature as a password to the password module; and receiving a status indicating whether the proffered password is equal to the stored password. - View Dependent Claims (17, 18, 19, 20)
-
Specification