RFID authentication architecture and methods for RFID authentication
First Claim
Patent Images
1. A method for mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising:
- requesting an identification from the tag;
receiving the identification;
using the received identification to select a password associated with the identification;
generating a password key based on the selected password, wherein the password key is generated using a mathematical kernel selected from a set of indexed mathematical kernels, wherein each mathematical kernel is adapted to receive a respective set of inputs, each set of inputs comprising a tap set, a number of cycles to be run, and an initialization vector;
encrypting the selected password using the password key; and
transmitting the encrypted password to the tag.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising requesting an identification from the tag, receiving the identification, using the received identification to select a password associated with the identification, generating a password key based on the selected password, encrypting the selected password using the password key, and transmitting the encrypted password to the tag.
18 Citations
16 Claims
-
1. A method for mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising:
-
requesting an identification from the tag; receiving the identification; using the received identification to select a password associated with the identification; generating a password key based on the selected password, wherein the password key is generated using a mathematical kernel selected from a set of indexed mathematical kernels, wherein each mathematical kernel is adapted to receive a respective set of inputs, each set of inputs comprising a tap set, a number of cycles to be run, and an initialization vector; encrypting the selected password using the password key; and transmitting the encrypted password to the tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising:
-
providing a tag identifier to the reader; receiving an encrypted password in response; decrypting the encrypted password using a password key, wherein the password key is generated using a mathematical kernel selected from a set of indexed mathematical kernels, wherein each mathematical kernel is adapted to receive a respective set of inputs, each set of inputs comprising a tap set, a number of cycles to be run, and an initialization vector; verifying the decrypted password; sending an acknowledgement if the password can be detected and verified; receiving a read memory request in response to the acknowledgement; and executing the read memory request. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification