Radio frequency identification tag lock and key
First Claim
Patent Images
1. An apparatus, comprising:
- a detector to determine whether a first radio frequency identification tag read by a reader that reads radio frequency identification tags is a match with a second radio frequency identification tag read by said reader andwherein one of the first and second radio frequency identification tags is a lock tag, and another of the first and second radio frequency identification tags is a key tag, and wherein said detector includes a nonce generator to generate a nonce, and a comparator to compare an encrypted version of the nonce encrypted using a cryptography key of the lock tag with an encrypted version of the nonce encrypted using a cryptography key tag.
1 Assignment
0 Petitions
Accused Products
Abstract
Briefly, in accordance with one embodiment of the invention, a radio frequency identification tag system includes a lock tag to secure an item or an area, and one or more key tags associated with the lock tag to allow access to the item or area or to otherwise validate the lock tag and key tag. A detector allows access or other validation when a valid key tag is determined to be present within a predetermined range of the lock tag.
13 Citations
17 Claims
-
1. An apparatus, comprising:
-
a detector to determine whether a first radio frequency identification tag read by a reader that reads radio frequency identification tags is a match with a second radio frequency identification tag read by said reader and wherein one of the first and second radio frequency identification tags is a lock tag, and another of the first and second radio frequency identification tags is a key tag, and wherein said detector includes a nonce generator to generate a nonce, and a comparator to compare an encrypted version of the nonce encrypted using a cryptography key of the lock tag with an encrypted version of the nonce encrypted using a cryptography key tag. - View Dependent Claims (2, 3, 5, 6, 7)
-
-
4. An apparatus as claimed in 1, including an encryptor to encrypt a nonce using a public cryptography key received from the lock tag to provide an encrypted nonce to the key tag, and a comparator to compare a nonce generated by the nonce generator with a decrypted version of the encrypted nonce that was decrypted using a private cryptography key of the key tag.
-
8. A method, comprising:
-
generating a nonce; encrypting the nonce using a cryptography key received from a first radio frequency identification tag to result in an encrypted nonce; sending the encrypted nonce to a second radio frequency identification tag that decrypts the encrypted nonce to result in a decrypted nonce; receiving the nonce from the second radio frequency identification tag; comparing the nonce generated by said generating to the decrypted nonce; and determining, as a result of said comparing, whether the first radio frequency identification tag is associated with said second radio frequency identification tag. - View Dependent Claims (9)
-
-
10. A method, comprising:
-
generating a series of nonces; sending the series of nonces to a first radio frequency identification tag and a second radio frequency identification tag; receiving encrypted versions of the series of nonces from the first and second radio frequency identification tags; comparing the encrypted versions of the series of nonces received from the first radio frequency identification tag with the encrypted versions of the series of nonces received from the second radio frequency identification tag; and determining, as a result of said comparing, whether the first radio frequency identification tag is associated with said second radio frequency identification tag. - View Dependent Claims (11, 12)
-
-
13. An article comprising a storage medium having stored thereon instructions that, when executed by a computing platform, result in verification of association of at least two or more radio frequency identification tags by:
-
generating a nonce; encrypting the nonce using a cryptography key received from a first radio frequency identification tag to result in an encrypted nonce; sending the encrypted nonce to a second radio frequency identification tag that decrypts the encrypted nonce to result in a decrypted nonce; receiving the nonce from the second radio frequency identification tag; comparing the nonce generated by said generating to the decrypted nonce; and determining, as a result of said comparing, whether the first radio frequency identification tag is associated with said second radio frequency identification tag. - View Dependent Claims (14)
-
-
15. An article comprising a storage medium having stored thereon instructions that, when executed by a computing platform, result in verification of association of at least two or more radio frequency identification tags by:
-
generating a series of nonces; sending the series of nonces to a first radio frequency identification tag and a second radio frequency identification tag; receiving encrypted versions of the series of nonces from the first and second radio frequency identification tags; comparing the encrypted versions of the series of nonces received from the first radio frequency identification tag with the encrypted versions of the series of nonces received from the second radio frequency identification tag; and determining, as a result of said comparing, whether the first radio frequency identification tag is associated with said second radio frequency identification tag. - View Dependent Claims (16, 17)
-
Specification