Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Radio frequency identification transponder security

A technology of radio frequency identification and transponder, which is applied in the field of RFID and can solve problems such as recoding

Active Publication Date: 2008-01-09
BRITISH TELECOMM PLC
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is the cost and management of using the infrastructure
Each time ownership or control of a tagged item changes hands, parties in the supply chain must have the necessary equipment to perform the recoding operation, which represents additional cost
Furthermore, unless some form of access control is provided, recoding operations are vulnerable to recoding by malicious parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio frequency identification transponder security
  • Radio frequency identification transponder security
  • Radio frequency identification transponder security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Figure 1 is a schematic overview of an embodiment of the invention showing the relationship and communication between the three main components of an RFID system according to the invention. Several exchanges E1 to E5 occur during the event between the tag, the reader and the third party.

[0045] Figure 2 is a flowchart describing the steps of a typical read and access session.

[0046] Embodiments of the present invention will now be discussed in conjunction with FIGS. 1 and 2 .

[0047] In step S1 of Figure 2, the reader (4) establishes initial contact with the tag (2) by scanning the tag (2) with appropriate radio frequency radiation. This is depicted by the arrow labeled E1 in Figure 1 .

[0048] In step S2, the tag responds by sending an output E2 to the reader comprising the "pseudo-name".

[0049] In step S3, the reader receives the pseudonym (output E2). If the reader has within itself the information that allows it to "decode" the pseudonym ("yes"), there i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Security and privacy of tag information in an RFID-based system can be achieved through the usage of pseudonyms generated based on one-way hash functions. A system based on binary one-way trees allows for the scalable generation and decoding of authentication keys to obtain access to tag identities. The apparatus and methods described can also be adapted to provide limited access for readers to tag information.

Description

technical field [0001] The present invention relates generally to RFID (Radio Frequency Identification) technology and, in particular, describes apparatus and methods for operating security and privacy systems using this technology. Background technique [0002] Radio Frequency Identification (RFID) is a technology with high potential to fundamentally change the way information is collected about the physical world. RFID tags are commonly used to allow identification of multiple items without line of sight or manual intervention. Using RFID, pallets of goods in the supply chain can be counted without the need to unload or unpack the pallets. RFID embedded in consumer products can provide customers with a new shopping experience by allowing for skip-the-line checkout and inhibiting counterfeiting. After the initial point of sale, RFID tags can be used by consumers to enable service in their homes, or for product returns, recycling, and second-hand sales. Automatic identifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00G06K7/00G06F21/00G06F21/44G06F21/62G06F21/79
CPCG06K17/0022G06K7/0008G06K19/07G06K17/00H04B5/48
Inventor 特雷弗·伯布里奇安德列·亚索伯拉
Owner BRITISH TELECOMM PLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products