EP1257974A1 - Method of authenticating a tag - Google Patents

Method of authenticating a tag

Info

Publication number
EP1257974A1
EP1257974A1 EP00936230A EP00936230A EP1257974A1 EP 1257974 A1 EP1257974 A1 EP 1257974A1 EP 00936230 A EP00936230 A EP 00936230A EP 00936230 A EP00936230 A EP 00936230A EP 1257974 A1 EP1257974 A1 EP 1257974A1
Authority
EP
European Patent Office
Prior art keywords
tag
data set
stored
security block
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP00936230A
Other languages
German (de)
English (en)
French (fr)
Inventor
Robert W. Baldwin
Chester Piotrowski
Paul A. Sevcik
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
3M Innovative Properties Co
Original Assignee
3M Innovative Properties Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 3M Innovative Properties Co filed Critical 3M Innovative Properties Co
Publication of EP1257974A1 publication Critical patent/EP1257974A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators

Definitions

  • the invention relates to a method of authenticating a device, tag, label, or similar item, and in one embodiment to a method of cryptographically verifying a tag of a matched component system so that hardware that is part of the matched component system will only interrogate tags that are authenticated as part of the matched component system.
  • Encryption has been used for many years to make information secure against the efforts of those who should not have access to that information.
  • Information is first encoded by a first authorized user, and then decoded by a second authorized user to obtain access to the information.
  • An example of simple encryption would be to equate a unique number with each letter of the alphabet, and then to represent the information of interest using those numbers, instead of letters. A person who knows the encryption algorithm (the substitution of a unique number for each letter) could then decode the information to obtain access to it. This type of simple encryption is easily broken however, and thus is not very secure.
  • the patent literature includes a number of references related to the uses of encryption for tracking manufactured articles, or for performing article authentication.
  • Tags or labels containing information about an article can be provided as part of a matched component system along with the hardware used to read, scan, or interrogate those tags or labels.
  • Examples of such systems include bar code labels (or printing equipment) and scanners, and radio frequency identification (RFLD) tags and RFLD interrogators.
  • RFLD radio frequency identification
  • One reason to encourage the use of matched component systems is to enable the system to avoid interrogating tags belonging to another system. Thus, error messages may be reduced, and it may be possible to use two or more systems to identify various materials in the same location. Another reason is related to the product or system warranties.
  • a system provider may warrant the operation of the system if a tag interrogator is used in conjunction with authentic tags, but not otherwise. Specifically, a system provider may warrant the operation of an RFLD system when that provider sells the RFLD tags, and also sells the equipment used to write information to, and/or read information from, those tags.
  • the authentication method described herein enables a system or user to authenticate, for example, radio frequency identification (RFLD) tags by providing an
  • RFID tag having a stored security block that is cryptographically related to the tag address, obtaining the tag address from the tag, applying a cryptographic transformation to at least the tag address and a private data set to obtain a security block, and then comparing that security block to the stored security block. If the two security blocks match, then the tag can be presumed to be authentic. Alternatively, the stored security block can be cryptographically transformed using at least a private data set to obtain a tag address, and that tag address can then be compared with the stored tag address. If the two tag addresses match, then the tag can be presumed to be authentic. Also described is an RFID tag for use with the present invention. The invention finds particularly useful application in the interrogation by portable or stationary RFID interrogators of RFID tags placed in library materials, such as books.
  • Figure 1 is a process diagram illustrating one embodiment of the inventive method for providing a tag with a security block that is a cryptographic transformation of the tag address;
  • Figure 2 is a process diagram illustrating one embodiment of the inventive method for authenticating a tag by field encryption and comparison
  • Figure 3 is a process diagram illustrating one embodiment of the inventive method for authenticating a tag by field decryption and comparison; and Figure 4 is a schematic diagram of an RFLD tag in accordance with the present invention.
  • a preferred method of authenticating an RFLD tag involves the following steps. First, a tag address that identifies the tag is obtained from the memory of the tag. Second, the tag address and a private data set, and optionally a public data set, are cryptographically transformed to provide a security block that is stored in the memory of the tag. Third, when it is desired to authenticate the tag, the tag address is again obtained and, along with the data set(s) is cryptographically transformed to provide a security block that is compared with the stored security block. Or, alternatively, the security block is cryptographically transformed, using the inverse of the original transformation, including appropriate data set(s), to obtain a tag address that is compared to the stored tag address.
  • RFLD tag 10 generally includes an antenna 12 connected to a memory device 14 such as an integrated circuit (IC).
  • the tag may include a power source, such as a battery or capacitor, or may be powered solely by the RFLD interrogator such that it receives both energy and information in the form of radio waves from the RFLD interrogator.
  • the tag may be provided with adhesive (typically pressure sensitive adhesive) so that it may be adhered to, for example, a library book. It will be appreciated by those skilled in the art that Figure 4 represents only one of the many embodiments of geometry and antenna design suitable for use in an RFID tag.
  • a commercial example of a suitable RFLD tag is one available from the Texas Instruments.
  • the Tag-it brand RFLD tag includes a first memory storage area that stores unalterable data (referred to as “permanent tag memory”), such as unique unalterable data identifying that specific tag (referred to herein as the "tag address”), and a second memory storage area that stores variable information provided by a user (referred to herein as "variable tag memory”).
  • Current Tag-it brand RFLD tags include 256 bits of variable tag memory, although more memory is likely to become available on that and other RFID tags in the future.
  • the Tag-it brand RFLD tag operates at a 13.56 MHz communication frequency, although tags and interrogators that operate at other frequencies may be used instead.
  • Tag-it brand RFLD tag systems may also be used with Windows- compatible software available from Texas Instruments to simplify the use of Tag-it brand RFLD tags and equipment.
  • the tag address is stored in the permanent tag memory. It is also preferred that this tag address be unique to insure that it is possible to identify and address a specific tag during use. This tag address might, for example, be 32 bits long, allowing over 4 billion unique addresses. Typically this tag address is programmed into the tag during manufacture and "factory locked" so that it cannot be changed later.
  • a tag address may include information stored in both the permanent tag memory and the variable tag memory, described below.
  • Variable tag memory may be used to store information about the manufacturer of the tag or the tag itself (such as when and where the tag was made), and/or about the article to which the tag is attached or to be attached. For example, where the RFLD tag will be attached to a library book or other material, the title, author, call number, checkout status, and usage statistics associated with that book may be stored in the variable tag memory. Other information that may be stored in the variable tag memory includes the name of the library that owns the book or material, the specific library branch from which it was borrowed, the appropriate location (such as the specific shelf location) for the book or material, type of item (book, CD, video tape), and the like.
  • variable tag memory may be locked, so that it cannot be inadvertently modified.
  • the data on a tag associated with an item belonging to a library can thereby be protected from accidental modification by an RFID-based airline baggage handling system or other RFID writer.
  • the locking procedure differs among RFLD tag suppliers. In the case of the Texas Instruments Tag- it brand RFLD tags, the smallest block of variable memory that can be locked in this manner is 32 bits, which may be used to store certain cryptographically transformed information in the manner described herein.
  • RFLD tags used in one embodiment of the invention are both readable and programmable. That is, the RFLD tag can be read or interrogated by an interrogation source to obtain some or all of the information stored in the variable tag memory of the tag for use or manipulation by a user, and can also be programmed (written) with information provided by a system or user.
  • Suitable RFLD interrogation sources and RFID writers are commercially available from Texas Instruments of Dallas, Texas under the designation "Commander 320.”
  • certain information is cryptographically transformed and written into a portion of the available variable tag memory by an RFLD writer, and in use the tag is interrogated by an RFID reader that determines whether the tag is authentic, as described in greater detail below.
  • RFID readers preferably can interrogate multiple RFLD tags virtually simultaneously (the Commander 320 brand interrogation source currently is able to interrogate 30 RFID tags per second), though this feature is not required.
  • Tag address is obtained from the tag, cryptographically transformed as described below, and the resulting security block is then stored on the tag.
  • Figure 1 One exemplary process for providing a tag having a stored security block in accordance with the present invention is shown in Figure 1.
  • Step 100 is to read or interrogate the tag to obtain the tag address 102.
  • the tag address is then concatenated with at least one data set, and preferably two data sets. If one data set is used, then that data set should be a private data set 106 that is not generally available to the public, but is stored in and used by the interrogation source.
  • one data set may be private and the other a public data set 104, as represented in Figure 1.
  • the tag address and the data set(s) could be interleaved or otherwise scrambled (instead of being concatenated) if desired, though this is not believed to add significantly to the security or reliability of the system.
  • the public and private data sets may consist of any string of characters and/or numbers, and can be human readable strings that are represented as binary data using standard methods such as ASCII, UTF-8 or Unicode.
  • the public data set may be widely distributed or not, as desired. In other words, the public and private data sets are simply two data sets, which may have different levels of secrecy imposed on them by the user.
  • the data set(s), and particularly the private data set is preferably a string of random characters and/or numbers, so that it is difficult or impossible to reverse engineer the data set from the cryptographically transformed information.
  • a random or substantially random process may be used, such as a random number generator.
  • the public or private data set may be subsumed within software used to create and authenticate the tags.
  • the software in general, will consist of machine language instructions, which are not readily intelligible to people and cannot be deciphered except by highly specialized individuals expending a great deal of time.
  • the data set(s) will preferably be sufficiently difficult to locate within that software that it may be considered for all practical purposes to be private even when the software itself is widely distributed.
  • the form of the public or private data sets may also be chosen to facilitate legal protection under copyright, trade secret or other law, so that any unauthorized user of the data set(s) would also be infringing on a legally protected right.
  • tag address may be of any desired length and content
  • the tag address may have, for example, 32 bits of information
  • the public data set may have at least 32 bytes of information
  • the private data set may have at least 32 bytes of information.
  • An exemplary tag address could be the hexadecimal value 0x012345678, and exemplary public data set may be the ASCII string "3M Radio Frequency Identification Systems," and an exemplary private data set may be
  • the tag address 102 and private data set 106, and optionally the public data set 104, are then fed into a cryptographic transformation algorithm 108, such as a cryptographic hash algorithm, which transforms the data and outputs a message digest 110 of, for example, 160 bits in length.
  • Cryptographic transformations encompass both conventional reversible encryption such as the Data Encryption Standard (DES, which is also referred to as the Data Encryption Algorithm (DEA) by ANSI, and as the DEA-1 by the ISO), and other related techniques such as the use of a one-way cryptographic hash such as the Secure Hash Algorithm 1, or SHAl. Examples of both types of algorithms along with detailed source code in the C programming language are including in the book Applied Cryptography. Protocols.
  • DES-CBC-MAC and DES-DMAC may be used as the cryptographic transformation method of the present invention
  • cryptographic hash algorithms such as SHAl, MD5, and RTPEMD-160 are preferred because they provide a relatively high level of security against attempts to reverse-engineer the private data set when the message digest and the public data set are known, and also because they are readily available, easy to implement, and free of significant governmental restrictions on use.
  • the source code associated with the SHAl described in the Applied Cryptography reference cited above is currently available on computer disc from Bruce Schneier, Counterpane Systems, 7115 W. North Ave., Suite 16, Oak Park, LL 60302-1002.
  • a specified portion of the message digest may be designated and stored in (written to) the variable tag memory of the RFLD tag.
  • This portion of the message digest is security block 112.
  • a lockable unit or block of the variable tag memory perhaps 32 bits, may determine the appropriate size of the security block of information from among the message digest which should be designated and stored in the variable tag memory. It may also or instead be desirable to store the message digest or the security block in the permanent tag memory, which would normally be done by or for the manufacturer of the tag.
  • the output of the cryptographic transformation (such as SHAl) will be referred to as the "message digest,” and the entirety or portion of the message digest that is stored on the RFLD tag will be referred to as the “security block.”
  • the security block 112 may be created by designating at least part of the message digest, and then written to the RFID tag in the manner described above as shown at 114.
  • the tag may be used for authentication in the field. Authentication may be performed in several different manners, 'two of which are described below. The first involves following the same process used to encrypt the tag, and then comparing the result (the security block) with the stored security block to determine whether they are the same. If the two security blocks are the same, then the tag is authentic. If they are different, then the tag is not authentic. This is referred to as "field encryption and comparison.”
  • the second authentication process described below involves essentially the reverse. That is, the authentication process begins by obtaining the stored security block from the memory of the tag, performing an encryption transformation in reverse using the private data set and, if needed, the public data set, to obtain a tag address. The tag address is then compared with the stored tag address. If the two tag addresses are the same, then the tag is authentic. If they are different, then the tag is not authentic. This is referred to as "field decryption and comparison.” In order to use this second authentication process, the security block should comprise the entire message digest.
  • Figure 2 illustrates the field encryption and comparison process steps used to determine whether a certain tag is authentic.
  • the user in the field follows the same method as shown in Figure 1, and then compares the resulting value with the stored security block to determine whether the tag is authentic.
  • steps 200 through 212 are the same as their counterparts in Figure 1. That is, the tag address is obtained 200; the tag address 202, the private data set 206, and optionally the public data set 204 are provided to the cryptographic transformation algorithm 208 that provides a message digest 210, from which a security block is created 212.
  • the RFID reader obtains the stored security block from the tag, as shown at 214, and compares the results (shown as 216) of the security block 212 with the stored security block obtained from the tag at 214. If the two security blocks are the same, then the tag is authentic. If the two messages do not match, then the user could conclude that the item is not authentic, and take any appropriate action. Such action could, for example, include terminating processing of the item to which the tag was affixed.
  • Figure 3 illustrates the field decryption and comparison process steps used to determine whether a certain tag is authentic. As shown in Figure 3, the security block
  • the tag 300 (which in this embodiment should be identical to the message digest) is obtained from the tag 300; the security block 302, the private data set 306, and optionally the public data set 304 are provided to the cryptographic transformation algorithm 308 that provides the tag address 310.
  • the RFLD reader then obtains the stored tag address from the tag 312, and compares the results (shown as 314) of the tag address 310 with the stored tag address at 312. If the two tag addresses are the same, then the tag is authentic. If the two tag addresses are not the same, the tag is not authentic.
  • the cryptographic transformation can be a reversible block cipher, stream cipher, or other suitable process.
  • the cryptographic transformation 308 could be the inverse of the cryptographic transformation used to create the security block stored on the RFLD tag.
  • the cryptographic transformation could be a block cipher such as DES running in encrypt mode (to encrypt the security block) and decrypt mode (to field decrypt the security block), where the key to the block cipher would be a function of the public and private data sets.
  • the data set(s) could be passed through a cryptographic hash function to produce a 160-bit message digest and a predetermined subset of these bits would be selected to create the 56-bit key for the DES block cipher.
  • the key could be a concatenation or other predetermined arrangement of the bits that make up the data set(s).
  • the role of the tag address and security block can be reversed. This reversal can be useful when the tag address and security block are stored such that one is more difficult to change than the other. If the tag manufacturer writes the tag address and the application vendor writes the security block, then reversing the roles of the tag address and security block may be useful in some circumstances.
  • This Example is a representation of an arbitrary tag address, public data set, and private data set that could be used in conjunction with the method of the present invention.
  • a tag address expressed in hexadecimal, could be 0x12345678. This address would be concatenated with an ASCII-string public data set "Copyright (c) 2000, 3M IPC. All Rights Reserved", which in hexadecimal notation is "0x43 0x6f
  • This concatenated data would further be concatenated with a hexadecimal private data set "OxeO 0x34 0xc7 OxfO 0xf9 0xf7 0x37 0x26 0xf6 0x19 0x53 0x15 Oxl 1 0x64 0xe5 0x30 0x45 0x4b 0xe3 Oxbf 0x6a Oxca Oxdc 0x6e Oxbe 0xb4 0x84 Oxe3 Oxbl 0x2d 0x77 0x38", which could be generated by computer using a pseudo-random number generator.
  • the full concatenated string would be processed using the SHAl cryptographic hash algorithm, and the resulting message digest, expressed in hexadecimal, would be 0x3385275891ceb2e69cdc4a56031276413d6d702d. From that one could select the low-order nibble (4 bits) of each of the first eight (8) bytes of the message digest (shown as 'the underlined characters in the preceding message digest) which would then be concatenated to provide a security block, expressed in hexadecimal, of 0x35781 e26 that could be stored on an RFLD tag by an RFLD writer. The tag could then be authenticated by using the field encryption and comparison process described above to determine whether the tag was authentic.
  • the authentication method described herein finds particularly useful application in the authentication of RFLD tags used with library materials such as books.
  • a portable (handheld, for example) RFID interrogator may be used to interrogate the RFID tags and, if the tags are authentic, to obtain other information from the RFLD tag that is useful to library staff members.
  • Stationary RFLD interrogators such as patron self-service devices, staff work stations, and stations at which library materials having only optical bar codes are converted to have RFLD tags, may also use the authentication method of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Burglar Alarm Systems (AREA)
  • Credit Cards Or The Like (AREA)
EP00936230A 2000-02-04 2000-05-23 Method of authenticating a tag Withdrawn EP1257974A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US49890200A 2000-02-04 2000-02-04
US498902 2000-02-04
PCT/US2000/014191 WO2001057807A1 (en) 2000-02-04 2000-05-23 Method of authenticating a tag

Publications (1)

Publication Number Publication Date
EP1257974A1 true EP1257974A1 (en) 2002-11-20

Family

ID=23982972

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00936230A Withdrawn EP1257974A1 (en) 2000-02-04 2000-05-23 Method of authenticating a tag

Country Status (10)

Country Link
EP (1) EP1257974A1 (ko)
JP (1) JP2003524242A (ko)
KR (1) KR20020074494A (ko)
CN (1) CN1433558A (ko)
AR (1) AR029034A1 (ko)
AU (1) AU5157600A (ko)
BR (1) BR0017090A (ko)
CA (1) CA2399092A1 (ko)
MX (1) MXPA02007518A (ko)
WO (1) WO2001057807A1 (ko)

Families Citing this family (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6724895B1 (en) 1998-06-18 2004-04-20 Supersensor (Proprietary) Limited Electronic identification system and method with source authenticity verification
AU2001274896A1 (en) 2000-05-22 2001-12-03 Avery Dennison Corporation Trackable files and systems for using the same
US6816075B2 (en) 2001-02-21 2004-11-09 3M Innovative Properties Company Evidence and property tracking for law enforcement
US7137000B2 (en) 2001-08-24 2006-11-14 Zih Corp. Method and apparatus for article authentication
US6894615B2 (en) 2001-10-09 2005-05-17 3M Innovative Properties Company Article with retroreflective and radio frequency-responsive features
EP1454291B1 (en) * 2001-12-11 2007-08-08 Tagsys SA Secure data tagging systems
US6758405B2 (en) 2001-12-19 2004-07-06 3M Innovative Properties Company Article with retroreflective and radio frequency-responsive features
US20030130912A1 (en) 2002-01-04 2003-07-10 Davis Tommy Lee Equipment management system
US7195173B2 (en) 2002-10-25 2007-03-27 Symbol Technologies, Inc. Optimization of a binary tree traversal with secure communications
CZ20023713A3 (en) * 2002-11-08 2004-06-16 Atme S. R. O. Method of registering and/or protecting goods and an implementation system for this method
US20060259772A1 (en) * 2003-03-26 2006-11-16 Kruger Johan D Authentication of radio frequency transponders
AU2003264927A1 (en) * 2003-09-22 2005-04-11 Nokia Corporation Method and electronic terminal for rfid tag type encryption
US7661132B2 (en) * 2003-09-26 2010-02-09 Nippon Telegraph And Telephone Corporation Tag privacy protection method, tag device, backend apparatus, updater, update solicitor and record medium carrying such programs in storage
JP2005338908A (ja) * 2004-05-24 2005-12-08 Sato Corp 情報記録媒体および情報記録媒体の情報改変判定方法
JP2005348306A (ja) * 2004-06-07 2005-12-15 Yokosuka Telecom Research Park:Kk 電子タグシステム、電子タグ、電子タグリーダライタ、およびプログラム
WO2006046289A1 (ja) * 2004-10-28 2006-05-04 Mitsubishi Denki Kabushiki Kaisha 通信装置および通信方法
JP2006127228A (ja) * 2004-10-29 2006-05-18 Sato Corp 保証書システムおよび保証書
KR100628315B1 (ko) 2004-11-29 2006-09-27 한국전자통신연구원 양도되는 물품의 전자식별 태그값 갱신 방법 및 시스템
JP4412162B2 (ja) * 2004-12-07 2010-02-10 三菱電機株式会社 利用者認証装置および入退室管理装置
DE102004059391C5 (de) * 2004-12-09 2012-01-12 Jörg Eberwein Krypto-Wireless-Tag
JP4139382B2 (ja) 2004-12-28 2008-08-27 インターナショナル・ビジネス・マシーンズ・コーポレーション 製品/サービスに係る所有権限を認証する装置、製品/サービスに係る所有権限を認証する方法、及び製品/サービスに係る所有権限を認証するプログラム
GB0428543D0 (en) * 2004-12-31 2005-02-09 British Telecomm Control of data exchange
US7677461B2 (en) * 2005-03-10 2010-03-16 Mil. Digital Labeling Inc. Digital labels for product authentication
US7647499B2 (en) * 2005-03-24 2010-01-12 Avaya Inc Apparatus and method for ownership verification
KR100818244B1 (ko) * 2005-05-10 2008-04-02 삼성전자주식회사 태그-관련정보 보안방법 및 이를 적용한 태그-관련정보보안시스템
KR100682062B1 (ko) * 2005-06-23 2007-02-15 삼성전자주식회사 리더기, 태그, 전파식별(rfid) 시스템 및 전파 식별방법
US8917159B2 (en) 2005-08-19 2014-12-23 CLARKE William McALLISTER Fully secure item-level tagging
KR100699467B1 (ko) * 2005-09-28 2007-03-26 삼성전자주식회사 Rf-id 태그, rf-id 사생활보호 시스템 및 그 방법
GB2431545B (en) * 2005-10-24 2011-01-12 Chien Yaw Wong Security-enhanced RFID system
KR100799560B1 (ko) * 2005-12-01 2008-01-31 한국전자통신연구원 모바일 전파식별을 위한 보안 방법, 이를 위한 모바일 전파식별 리더 및 그 시스템
KR100772521B1 (ko) * 2005-12-12 2007-11-01 한국전자통신연구원 Rfid 시스템에서의 태그 인증 장치 및 방법
US20070205864A1 (en) * 2006-02-17 2007-09-06 Datamars S.A. Secure radio frequency identification system
KR100722363B1 (ko) * 2006-03-13 2007-05-28 강민섭 강력한 인증 프로토콜을 갖는 rfid 시스템, 태그 및인증 방법
CA2644320A1 (en) * 2006-03-31 2007-10-11 British Telecommunications Public Limited Company Method and device for obtaining item information using rfid tags
KR100760044B1 (ko) 2006-04-27 2007-09-18 고려대학교 산학협력단 자체 재암호화 프로토콜을 이용하는 태그 리드 시스템 및그 방법
JP4913520B2 (ja) * 2006-09-28 2012-04-11 株式会社横須賀テレコムリサーチパーク データ認証システム及びデータ認証方法
JP2008143669A (ja) * 2006-12-11 2008-06-26 Brother Ind Ltd 物品管理システム、無線タグ、及び無線タグ情報読み取り装置
DE102007016329B4 (de) 2007-04-04 2012-08-30 Embedded Innovation Gmbh & Co. Kg Authentifizierbares Etikett sowie Vorrichtung zum Authentifizieren eines authentifizierbaren Etiketts
US9218585B2 (en) 2007-05-25 2015-12-22 Hussmann Corporation Supply chain management system
CN101201943B (zh) * 2007-07-23 2010-12-29 游忠惠 一种应用射频识别技术进行试卷管理的系统及其方法
KR100848791B1 (ko) * 2007-11-06 2008-07-28 주식회사 이시티 보안 검증이 가능한 태그 데이터 기록 및 취득 방법, 태그데이터 기록 및 취득 장치
JP5525133B2 (ja) * 2008-01-17 2014-06-18 株式会社日立製作所 デジタル署名及び認証のためのシステム及び方法
CN101976365B (zh) * 2010-11-05 2012-09-19 中国航天科工集团第二研究院七○六所 一种安全射频识别系统
CN103679080B (zh) * 2012-09-20 2017-02-15 天津中兴智联科技有限公司 标签识别距离的控制方法、阅读器及系统
CN102930303A (zh) * 2012-09-25 2013-02-13 安徽思米来电子科技有限公司 一种用于安全领域的有源被动射频识别方法及系统
DE102012109446B4 (de) * 2012-10-04 2016-09-08 Eckhard Rüter System zur fälschungssicheren Codierung von elektronischen Brieftaubenringen
CN102932338B (zh) * 2012-10-24 2015-01-21 中国航天科工集团第二研究院七〇六所 一种安全的射频识别系统的网络接入系统及方法
US9225519B1 (en) 2015-03-02 2015-12-29 Federico Fraccaroli Method, system, and apparatus for enabling secure functionalities
DE112018000705T5 (de) 2017-03-06 2019-11-14 Cummins Filtration Ip, Inc. Erkennung von echten filtern mit einem filterüberwachungssystem
US20210248439A1 (en) * 2018-04-25 2021-08-12 Eagile Incorporated Method and apparatus for rfid authentication

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE2949351C2 (de) * 1979-12-07 1982-04-15 The Grey Lab. Establishment, 9490 Vaduz Verfahren und Vorrichtung zur Erzeugung sowie Kontrolle von Dokumenten sowie dabei verwendetes Dokument
FR2653248B1 (fr) * 1989-10-13 1991-12-20 Gemolus Card International Systeme de paiement ou de transfert d'information par carte a memoire electronique porte monnaie.
FR2697929B1 (fr) * 1992-11-10 1995-01-13 Innovatron Sa Protocole sécurisé d'échange de données entre un dispositif de transfert et un objet portatif.
US5832090A (en) * 1995-08-10 1998-11-03 Hid Corporation Radio frequency transponder stored value system employing a secure encryption protocol
FR2764977B1 (fr) * 1997-06-18 1999-08-20 Stella Etiquette electronique comportant des moyens de detection d'une grandeur physique
US6154137A (en) * 1998-06-08 2000-11-28 3M Innovative Properties Company Identification tag with enhanced security
EP0982687A1 (en) * 1998-08-26 2000-03-01 Datamars SA Method for preventing or detecting fraud in an identification system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0157807A1 *

Also Published As

Publication number Publication date
JP2003524242A (ja) 2003-08-12
BR0017090A (pt) 2003-02-25
CA2399092A1 (en) 2001-08-09
KR20020074494A (ko) 2002-09-30
AR029034A1 (es) 2003-06-04
MXPA02007518A (es) 2003-01-28
AU5157600A (en) 2001-08-14
CN1433558A (zh) 2003-07-30
WO2001057807A1 (en) 2001-08-09

Similar Documents

Publication Publication Date Title
WO2001057807A1 (en) Method of authenticating a tag
USRE46447E1 (en) RFID mutual authentication verification session
CA2023872C (en) Databaseless security system
US8143995B2 (en) Control of data exchange
US7832001B2 (en) Identification system and method
US20050036620A1 (en) Encryption of radio frequency identification tags
WO2006049636A2 (en) Master tags
CA2556235A1 (en) Protection of non-promiscuous data in an rfid transponder
WO2009052059A1 (en) Rfid tag using encrypted value
WO2006132435A1 (en) Portable token device
Langheinrich et al. Practical minimalist cryptography for RFID privacy
EP2149124B1 (en) Apparatuses, system and method for authentication
CN115511019A (zh) 绑定rfid标签和物品条码的防伪验证方法
Williamson Sr et al. Solutions for RFID smart tagged card security vulnerabilities
CN106408069A (zh) Epc卡的用户数据写入与读取方法和系统
US20240056438A1 (en) Using globally-unique numbers for all secure unique transactions, authentications, verifications, and messaging identities
CN1286050C (zh) 身份信息加/解密方法及识别系统
Grunwald New attacks against RFID-systems
Sabzevar Security in RFID Systems
Li et al. A Solution to Privacy Issues in RFID Item-level applications
Ray et al. StenoCipher to provide data confidentiality and tampered data recovery for RFID tag
Chien et al. RFID-based, Anonymous Authentication scheme
Samuel RFID security in door locks
Yang et al. Applying RFID technology in warranty service information system
Jalandhar et al. Security and Privacy Issues of RFID

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20020830

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20040407

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1052243

Country of ref document: HK