Radio frequency identification technology incorporating cryptographics
First Claim
Patent Images
1. A radio frequency identification (RFID) tag comprising:
- an RFID functional portion configured to enable wireless communication between the RFID tag and an RFID reader;
a data processing functional portion with asymmetric cryptographic capability and symmetric cryptographic capability; and
a power source configured to power the data processing functional portion,wherein the data processing functional portion comprises;
means to generate public-private cryptographic key pairs, each public-private cryptographic key pair comprising a public key and a private key for use in asymmetric cryptographic operations;
means to securely and secretly retain said private keys; and
means to release said public keys for use by other devices,wherein communication between the RFID tag and the RFID reader is based on both the symmetric and asymmetric cryptographic capabilities of the data processing functional portion.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a radio frequency identification (RFID) tag comprising: an RFID functional portion configured to enable wireless communication between the RFID tag and an RFID reader; a data processing functional portion with asymmetric cryptographic capability; and a power source configured to power the data processing functional portion.
66 Citations
19 Claims
-
1. A radio frequency identification (RFID) tag comprising:
-
an RFID functional portion configured to enable wireless communication between the RFID tag and an RFID reader; a data processing functional portion with asymmetric cryptographic capability and symmetric cryptographic capability; and a power source configured to power the data processing functional portion, wherein the data processing functional portion comprises; means to generate public-private cryptographic key pairs, each public-private cryptographic key pair comprising a public key and a private key for use in asymmetric cryptographic operations; means to securely and secretly retain said private keys; and means to release said public keys for use by other devices, wherein communication between the RFID tag and the RFID reader is based on both the symmetric and asymmetric cryptographic capabilities of the data processing functional portion. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A network comprising:
-
a server with asymmetric cryptographic capability; a plurality of radio frequency identification (RFID) tags; one or more RFID readers, each RFID reader being configured to relay data between the server and one or more RFID tags, thereby enabling secure and authenticable communication between the one or more RFID tags and the server; and a public key server configured to securely store public keys from public-private cryptographic key pairs for retrieval by any of the server, the RFID readers, and the RFID tags, wherein each of the server and the RFID tags is configured to upload at least one public key generated thereby to the public key server. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of securely communicating data between a radio frequency identification (RFID) tag and a server, the method comprising:
-
generating, by the RFID tag and the server, a symmetric encryption/decryption key; encrypting, by one of the RFID tag and the server, the data using the symmetric encryption/decryption key; generating, by the one of the RFID tag and the server, a digital signature for the data using an asymmetric private key; wirelessly transmitting, by the one of the RFID tag and the server, the encrypted data and the digital signature to the other of the RFID tag and the server; validating, by the other of the RFID tag and the server, the digital signature using an asymmetric public key corresponding to the asymmetric private key, said asymmetric public key being authenticated by reference to a public key server; decrypting, by the other of the RFID tag and the server, the encrypted data using the symmetric encryption/decryption key. - View Dependent Claims (15, 16, 17)
-
-
18. A method of updating a public cryptographic decryption key stored at one of an RFID tag and a server, said public cryptographic decryption key originating from the other of the RFID tag and the server, the method comprising:
-
combining, by the other of the RFID tag and the server, a new public cryptographic decryption key with a current public cryptographic decryption key corresponding to the public cryptographic decryption key stored at the one of the RFID tag and the server; generating, by the other of the RFID tag and the server, a digital signature for the combined new public cryptographic decryption key and current public cryptographic decryption key using a private cryptographic encryption key corresponding to the current public cryptographic decryption key; transmitting, by the other of the RFID tag and the server, the combined new public cryptographic decryption key and current public cryptographic decryption key and the digital signature to the one of the RFID tag and the server, validating, by the one of the RFID tag and the server, the digital signature using the public cryptographic decryption key stored at the one of the RFID tag and the server, where the public cryptographic decryption key has previously been securely transferred to the one of the RFID tag and the server; and replacing the public cryptographic decryption key stored at the one of the RFID tag and the server with the new public cryptographic decryption key. - View Dependent Claims (19)
-
Specification