RFID secure authentication
First Claim
Patent Images
1. A method of authenticating an RFID tag, the method comprising:
- encrypting a secret key stored on a first device with a unique identification code stored on an RFID tag to generate an original authentication signature at the first device;
storing the original authentication signature at the RFID tag;
reading the unique identification code from the RFID tag using a second device;
encrypting a copy of the secret key stored on the second device with the unique identification code to generate a second authentication signature at the second device;
comparing the second authentication signature to the original authentication signature; and
determining authenticity of the RFID tag based on the comparison of the second authentication signature and the original authentication signature.
1 Assignment
0 Petitions
Accused Products
Abstract
Authentication systems and methods for a population of devices each associated with an RFID tag are described. For each device, a secret key is combined cryptographically with a publicly-readable unique identifier (UID) of an RFID tag to obtain a unique authorization signature. The RFID tag is prepared utilizing the unique authorization signature as memory-access and/or tag-operation password(s). The systems and methods may safeguard against attacks whereby compromise of a single tag will not compromise the entire population of devices and may reduce or eliminate the use of inappropriate surgical devices during a surgical procedure.
70 Citations
20 Claims
-
1. A method of authenticating an RFID tag, the method comprising:
-
encrypting a secret key stored on a first device with a unique identification code stored on an RFID tag to generate an original authentication signature at the first device; storing the original authentication signature at the RFID tag; reading the unique identification code from the RFID tag using a second device; encrypting a copy of the secret key stored on the second device with the unique identification code to generate a second authentication signature at the second device; comparing the second authentication signature to the original authentication signature; and determining authenticity of the RFID tag based on the comparison of the second authentication signature and the original authentication signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for authenticating an RFID tag, comprising:
-
an RFID tag including; a unique identifier; and a password module configured to store a password; and a preparation unit including; an RFID communication module configured to communicate with the RFID tag; a unit memory configured to store a secret key; a processor coupled to the unit memory and the RFID communication module, the processor configured to; read the unique identifier from the RFID tag; encrypt the secret key with the unique identifier of the RFID tag to generate an authentication signature; and store the authentication signature as the password in the password module. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for authenticating a surgical instrument, the method system comprising:
a surgical instrument having an RFID tag, wherein the RFID tag includes; a unique identifier; and a password module configured to store a password; and
an authentication unit, including;an RFID communication module configured to communicate with the RFID tag; a unit memory configured to store a secret key; a processor coupled to the unit memory and the RFID communication module, the processor configured to; read the unique identifier from the RFID tag; encrypt the secret key with the unique identifier of the RFID tag to generate an authentication signature; transmit the authentication signature to the password module; and receive a verification status from the password module in response to the authentication signature matching the password. - View Dependent Claims (18, 19, 20)
Specification