Enhanced RFID tag authentication
First Claim
1. A method for a Radio Frequency Identification (RFID) system to cause an RFID tag having a first parameter to execute an instruction, the method comprising:
- sending a first command to the tag;
receiving from the tag at least an identifier and an encrypted version of the first parameter;
determining a key using the received identifier;
recovering the first parameter from the encrypted version using the key;
sending, at a first time, to the tag a single second command including the first parameter and a tag instruction; and
causing the tag to execute the tag instruction upon verifying the first parameter.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication method includes RFID tags authenticating RFID readers. A tag sends a tag identifier and a reader challenge to a reader in response to one or more commands from the reader. The reader then either derives a response to the reader challenge itself or has a verification authority derive the response. The response may be derived from parameter(s) in the reader challenge, and may be derived using a cryptographic key. The reader then sends the response to the tag along with another command. The tag verifies the response before executing instruction(s) included in the command.
-
Citations
20 Claims
-
1. A method for a Radio Frequency Identification (RFID) system to cause an RFID tag having a first parameter to execute an instruction, the method comprising:
-
sending a first command to the tag; receiving from the tag at least an identifier and an encrypted version of the first parameter; determining a key using the received identifier; recovering the first parameter from the encrypted version using the key; sending, at a first time, to the tag a single second command including the first parameter and a tag instruction; and causing the tag to execute the tag instruction upon verifying the first parameter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 10)
-
-
8. A method for a Radio Frequency Identification (RFID) system to cause an RFID tag having a first parameter to execute an instruction, the method comprising:
-
sending a first command to the tag; receiving from the tag at least an identifier and an encrypted version of the first parameter; determining a key using the received identifier; recovering the first parameter from the encrypted version using the key; deriving a second parameter from the first parameter using a deriving operation that includes one of; setting the second parameter equal to the first parameter; incorporating the first parameter into a string; and computing an arithmetic function of at least the first parameter; sending, at a first time, to the tag a single second command including the second parameter and a tag instruction, wherein the first parameter and the second parameter are independent of the tag instruction; and causing the tag to, upon verifying the second parameter using the deriving operation and the first parameter, execute the tag instruction. - View Dependent Claims (9, 11, 12, 13, 14)
-
-
15. A method for a Radio Frequency Identification (RFID) system to cause an RFID tag having a first parameter to execute an instruction, the method comprising:
-
sending a first command to the tag; receiving from the tag at least an identifier and an encrypted version of the first parameter; determining a key using the received identifier; recovering the first parameter from the encrypted version using the key; deriving a second parameter from the first parameter; sending, at a first time, to the tag a single second command including the second parameter and a tag instruction, wherein the first parameter and the second parameter are independent of the tag instruction; and causing the tag to, upon verifying the second parameter using the deriving operation and the first parameter, execute the tag instruction. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification