READ AUTHENTICATION METHOD AND SYSTEM FOR SECURING DATA STORED ON RFID TAGS
First Claim
1. A process for maintaining security of information stored on a radio frequency identification (RFID) tag comprising the steps of:
- storing predetermined data on an RFID tag according to a level of security;
interrogating said RFID tag with an RFID tag reader by providing a requesting key to said RFID tag;
comparing said requesting key to a predetermined stored key associated with the level of security and determining if a match exists; and
transmitting said predetermined data in response to and only if said match exists.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for limiting the reading out of data from an RFID tag by requiring a reader of the tag to be authenticated by providing the correct key to the tag, static or rotating, before the tag will transmit data. The limitation of transmission is done irrespective of whether the data is encrypted or not. The system and method may have a segmented or tiered access scheme where segments or portions of the data stored in the RFID tag are accessible by differing keys. Additionally, different encryption keys or schemes may be employed to provide differing encryption methods for the data in the differing segments or portions of the data stored in the RFID tag.
17 Citations
20 Claims
-
1. A process for maintaining security of information stored on a radio frequency identification (RFID) tag comprising the steps of:
-
storing predetermined data on an RFID tag according to a level of security;
interrogating said RFID tag with an RFID tag reader by providing a requesting key to said RFID tag;
comparing said requesting key to a predetermined stored key associated with the level of security and determining if a match exists; and
transmitting said predetermined data in response to and only if said match exists. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system of providing information to an RFID reader comprising:
-
an RFID tag comprising;
digital circuitry therein which is configured to at least aid in selectively disabling reading out of one or more predetermined subsets of data from said RFID tag until and unless said RFID tag receives in an interrogation from an RFID reader a reader key which matches a tag key which has been previously assigned to said one or more predetermined subsets of data stored on said RFID tag; and
an antenna for transmitting said predetermined data. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A process for securing functionality of a radio frequency identification (RFID) tag comprising the steps of:
-
storing predetermined data on an RFID tag;
interrogating said RFID tag with an RFID tag reader by providing a requesting key to said RFID tag;
comparing said requesting key to one or more predetermined stored keys associated with RFID tag functions comprising of reading the stored predetermined data, writing to the stored predetermined data, and locking the stored predetermined data;
determining if one or more matches exists; and
enabling, in response to the one or more determined matches, the associated RFID tag functions.
-
Specification