RFID authentication architecture and methods for RFID authentication
First Claim
Patent Images
1. A Radio frequency identification (RFID) reader for mutual authentication in a RFID system comprising the RFID reader and an RFID tag, the RFID reader configured to:
- request an identifier from the RHD tag;
receive the identifier;
select a password based at least in part on the identifier;
select a first of a plurality of indexed mathematical kernels, wherein the first mathematical kernel comprises a first parameter set;
use the first mathematical kernel to generate a first password keyencrypt the password using the first password key; and
transmit the password encrypted using the first password key to the RFID tag.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising requesting an identification from the tag, receiving the identification, using the received identification to select a password associated with the identification, generating a password key based on the selected password, encrypting the selected password using the password key, and transmitting the encrypted password to the tag.
18 Citations
20 Claims
-
1. A Radio frequency identification (RFID) reader for mutual authentication in a RFID system comprising the RFID reader and an RFID tag, the RFID reader configured to:
-
request an identifier from the RHD tag; receive the identifier; select a password based at least in part on the identifier; select a first of a plurality of indexed mathematical kernels, wherein the first mathematical kernel comprises a first parameter set; use the first mathematical kernel to generate a first password key encrypt the password using the first password key; and transmit the password encrypted using the first password key to the RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A Radio frequency identification (RFID) tag for mutual authentication in a radio frequency identification (RFID) system comprising an RFID reader and the RFID tag, the RFID tag configured to:
-
provide an identifier to the RHD reader; in response to providing the identifier, receive, from the RHD reader, a password encrypted using a first password key generated using a first of a plurality of indexed mathematical kernels, wherein the first mathematical kernel comprises a first parameter set; verify the password encrypted using the first password key; in response to successfully verifying the password encrypted using the first password key, transmit a first acknowledgement (ACK) to the RFID reader; receive, from the RFID reader, a first read memory request in response to the first ACK; and transmit at least a portion of the data stored at the RHD tag to the RFID reader in response to the first read memory request. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification