System and method for authenticating RFID tags
First Claim
1. A method for authenticating a radio frequency identification (RFID) tag, the method comprising:
- sending a challenge comprising an index value i to the RFID tag, the index value i in a set of index values, wherein each index value in the set of index values is associated with a single signature, and wherein an ith signature corresponding to the index value i comprises an ith set of signature components;
receiving, in response to the challenge, at least, the corresponding ith set of signature components, wherein each of said ith set of signature components having been generated from a message mi comprising at least a hidden portion Hi and a corresponding visible portion Vi and stored on the RFID tag;
obtaining the corresponding visible portion Vi and a public key W corresponding to the ith set of signature components; and
,verifying the corresponding ith set of signature components using the corresponding visible portion Vi and the public key W;
wherein the RFID tag is authenticated if the corresponding ith set of signature components is verified, andwherein the hidden portion Hi is recoverable from the corresponding ith set of signature components,wherein each of the ith set of signature components stored on the RFID tag remain available for subsequent challenges.
7 Assignments
0 Petitions
Accused Products
Abstract
A system and method of providing authenticity to a radio frequency identification (RFID) tag are provided. The method comprises generating a plurality of digital signatures, wherein each digital signature is generated using an index value unique to that digital signature and using information associated with the RFID tag; and storing the plurality of digital signatures on the RFID tag in association with respective index values to enable a desired digital signature to be selected according to a provided index value. Also provided are a system and method of enabling an RFID reader to authenticate an RFID tag, which utilize a challenge comprising an index value to request one of the stored signature and authenticating same. Also provided is an RFID tag that is configured to participate in the challenge-response protocol.
-
Citations
24 Claims
-
1. A method for authenticating a radio frequency identification (RFID) tag, the method comprising:
-
sending a challenge comprising an index value i to the RFID tag, the index value i in a set of index values, wherein each index value in the set of index values is associated with a single signature, and wherein an ith signature corresponding to the index value i comprises an ith set of signature components; receiving, in response to the challenge, at least, the corresponding ith set of signature components, wherein each of said ith set of signature components having been generated from a message mi comprising at least a hidden portion Hi and a corresponding visible portion Vi and stored on the RFID tag; obtaining the corresponding visible portion Vi and a public key W corresponding to the ith set of signature components; and
,verifying the corresponding ith set of signature components using the corresponding visible portion Vi and the public key W; wherein the RFID tag is authenticated if the corresponding ith set of signature components is verified, and wherein the hidden portion Hi is recoverable from the corresponding ith set of signature components, wherein each of the ith set of signature components stored on the RFID tag remain available for subsequent challenges. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable storage medium comprising computer executable instructions for execution by an RFID reader to authenticate a radio frequency identification (RFID) tag, the instructions comprising:
-
instructions to send a challenge comprising an index value i to the RFID tag, the index value i in a set of index values, wherein each index value in the set of index values is associated with a single signature, and wherein an ith signature corresponding to the index value i comprises an ith set of signature components; instructions to receive, in response to the challenge, at least, the corresponding ith set of signature components, wherein each of said ith set of signature components having been generated from a message mi comprising at least a hidden portion Hi and a corresponding visible portion Vi and stored on the RFID tag; instructions to obtain the corresponding visible portion Vi and a public key W corresponding to the ith set of signature components; and
,instructions to verify the corresponding ith set of signature components using the corresponding visible portion Vi and the public key W; wherein the RFID tag is authenticated if the corresponding ith set of signature components is verified, and wherein the hidden portion Hi is recoverable from the corresponding ith set of signature components, wherein each of the ith set of signature components stored on the RFID tag remain available for subsequent challenges.
-
-
15. A computing device operative to authenticate an RFID tag, the computing device comprising a processor, a memory, and an interface for establishing a communicable connection to the RFID tag, the memory comprising computer executable instructions for causing the processor to:
-
send a challenge comprising an index value i to the RFID tag, the index value i in a set of index values, wherein each index value in the set of index values is associated with a single signature, and wherein an ith signature corresponding to the index value i comprises an ith set of signature components; receive, in response to the challenge, at least, the corresponding ith set of signature components, wherein each of said ith set of signature components having been generated from a message mi comprising at least a hidden portion Hi and a corresponding visible portion Vi and stored on the RFID tag; obtain the corresponding visible portion Vi and a public key W corresponding to the ith set of signature components; and
,verify the corresponding ith set of signature components using the corresponding visible portion Vi and the public key W; wherein the RFID tag is authenticated if the corresponding ith set of signature components is verified, and wherein the hidden portion Hi is recoverable from the corresponding ith set of signature components, wherein each of the ith set of signature components stored on the RFID tag remain available for subsequent challenges.
-
-
16. An RFID reader configured to authenticate a RFID tag, the RFID reader operative to:
-
send a challenge comprising an index value i to the RFID tag, the index value i in a set of index values, wherein each index value in the set of index values is associated with a single signature, and wherein an ith signature corresponding to the index value i comprises an ith set of signature components; receive, in response to the challenge, at least, the corresponding ith set of signature components, wherein each of said ith set of signature components having been generated from a message mi comprising at least a hidden portion Hi and a corresponding visible portion Vi and stored on the RFID tag; obtain the corresponding visible portion Vi and a public key W corresponding to the ith set of signature components; and
,verify the corresponding ith set of signature components using the corresponding visible portion Vi and the public key W; wherein the RFID reader is operative to authenticate the RFID tag if the corresponding ith set of signature components is verified, wherein each of the ith set of signature components stored on the RFID tag remain available for subsequent challenges. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method of enabling an RFID tag to be authenticated, the method comprising:
-
receiving a challenge comprising an index value i, the index value i in a set of index values, wherein each index value in the set of index values is associated with a single signature, and wherein an ith signature corresponding to the index value i comprises an ith set of signature components; obtaining the corresponding ith set of signature components from i sets of signature components stored on the RFID tag, wherein each of said ith set of signature components having been generated from a message mi comprising at least a hidden portion Hi that includes the index value i unique to the corresponding ith set of signature components, and a corresponding visible portion Vi′
; and
,providing the corresponding ith set of signature components in response to the challenge; wherein a challenger may authenticate the RFID tag by obtaining the corresponding visible portion Vi and a public key W corresponding to the ith set of signature components, and authenticating the RFID tag when the corresponding ith set of signature components has been verified using the corresponding visible portion Vi and the public key W, wherein each of the i sets of signature components stored on the RFID tag remain available for subsequent challenges. - View Dependent Claims (22)
-
-
23. An RFID tag configured to:
-
receive a challenge comprising an index value i, the index value i in a set of index values, wherein each index value in the set of index values is associated with a single signature, and wherein an ith signature corresponding to the index value i comprises an ith set of signature components; obtain the corresponding ith set of signature components from i sets of signature components stored on the RFID tag, wherein each of said ith set of signature components having been generated from a message mi comprising at least a hidden portion Hi that includes the index value i unique to the corresponding ith set of signature components, and a corresponding visible portion Vi′
; and
,provide the corresponding ith set of signature components in response to the challenge; wherein a challenger may authenticate the RFID tag by obtaining the corresponding visible portion Vi and a public key W corresponding to the ith set of signature components, and authenticating the RFID tag when the corresponding ith set of signature components has been verified using the corresponding visible portion Vi and the public key W, wherein each of the i sets of signature components stored on the RFID tag remain available for subsequent challenges.
-
-
24. A method of manufacturing an RFID tag that may be authenticated, the method comprising:
-
generating a plurality of i sets of signature components, each of the i sets of signature components generated from a message mi comprising at least a hidden portion Hi and a corresponding visible portion Vi, wherein at least the hidden portion Hi is recoverable from at least one of the signature components; and
,storing each of the plurality of i sets of signature components on the RFID tag in association with a respective index value i, the index value i in a set of index values, wherein each index value i in the set of index values is associated with a single signature, and wherein an ith signature corresponding to the index value i comprises an ith set of signature components, and wherein each of the i sets signature components stored on the RFID tag remain available to be chosen by each of a plurality of challenges.
-
Specification