MY155079A - A system and method for providing integrity verification in radio frequency identification (rfid) - Google Patents

A system and method for providing integrity verification in radio frequency identification (rfid)

Info

Publication number
MY155079A
MY155079A MYPI2010005380A MYPI2010005380A MY155079A MY 155079 A MY155079 A MY 155079A MY PI2010005380 A MYPI2010005380 A MY PI2010005380A MY PI2010005380 A MYPI2010005380 A MY PI2010005380A MY 155079 A MY155079 A MY 155079A
Authority
MY
Malaysia
Prior art keywords
integrity value
rfid
rfid device
back end
end server
Prior art date
Application number
MYPI2010005380A
Inventor
Mohd Faizal Bin Mubarak
Jamalul-Lailbin Ab Dr Manan
Abdulrahman Ahmed Abdu Dr Muthana
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2010005380A priority Critical patent/MY155079A/en
Priority to PCT/MY2011/000109 priority patent/WO2012067487A1/en
Publication of MY155079A publication Critical patent/MY155079A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A TRUSTED RFID ENVIRONMENT IS ESTABLISHED BY EMBEDDING A TRUSTED PLATFORM MODULE (TPM) IN A RFID SYSTEM. A TRUSTED SERVICE SERVER IS PROVIDING SERVICES IN RFID TAG TO COMPENSATE FOR LIMITATION OF RESOURCES WITHIN RFID TAG. THE SYSTEM OF THE PRESENT INVENTION COMPRISING AT ?EAST ONE RFID TAG (20), TRUSTED SERVICE SERVER (26), AT LEAST ONE RFID DEVICE (14) AND AT LEAST ONE BACK END SERVER (10). THE METHOD (200) FOR PROVIDING INTEGRITY VERIFICATION IN RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEM USING TRUSTED PLATFORM MODULE COMPRISING STEPS OF SENDING INTEGRITY VALUE OF RFID DEVICE (14) TO BACK END SERVER (10) (202); VERIFYING INTEGRITY VALUE OF RFID DEVICE (14) (204); COMPARING INTEGRITY VALUE OF RFID DEVICE (14) TO INTEGRITY VALUE STORED IN BACK END SERVER (10) (206); SENDING INTEGRITY VALUE OF BACK END SERVER (10) TO RFID DEVICE (14) WHEN INTEGRITY VALUE OF RFID DEVICE (14) MATCHES INTEGRITY VALUE STORED IN BACK END SERVER (10) (208) ELSE VERIFICATION IS TERMINATED; VERIFYING INTEGRITY VALUE OF BACK END SERVER (10) (210); COMPARING INTEGRITY VALUE OF BACK END SERVER (10) TO INTEGRITY VALUE STORED IN RFID DEVICE (14) (212); SENDING INTEGRITY VALUE OF RFID DEVICE (14) TO RFID TAG (20) WHEN INTEGRITY VALUE OF RFID DEVICE (14) MATCHES INTEGRITY VALUE OF RFID TAG (RT) (214) ELSE VERIFICATION IS TERMINATED; VERIFYING INTEGRITY VALUE OF THE RFID DEVICE (216): COMPARING INTEGRITY VALUE OF RFID DEVICE (14) TO INTEGRITY VALUE STORED IN RFID TAG (20) (218); AND REQUESTING MACHINE READABLE INSTRUCTIONS AS SERVICE FROM TRUSTED SERVICE SERVER (26) BY RFID TAG (20) WHEN INTEGRITY VALUE OF RFID DEVICE MATCHES INTEGRITY VALUE STORED IN RFID TAG (20) (220). THE MOST ILLUSTRATIVE DRAWING IS
MYPI2010005380A 2010-11-16 2010-11-16 A system and method for providing integrity verification in radio frequency identification (rfid) MY155079A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2010005380A MY155079A (en) 2010-11-16 2010-11-16 A system and method for providing integrity verification in radio frequency identification (rfid)
PCT/MY2011/000109 WO2012067487A1 (en) 2010-11-16 2011-06-17 A system and method for providing integrity verification in radio frequency identification (rfid)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2010005380A MY155079A (en) 2010-11-16 2010-11-16 A system and method for providing integrity verification in radio frequency identification (rfid)

Publications (1)

Publication Number Publication Date
MY155079A true MY155079A (en) 2015-08-28

Family

ID=46084249

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2010005380A MY155079A (en) 2010-11-16 2010-11-16 A system and method for providing integrity verification in radio frequency identification (rfid)

Country Status (2)

Country Link
MY (1) MY155079A (en)
WO (1) WO2012067487A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038478A (en) * 2014-05-19 2014-09-10 瑞达信息安全产业股份有限公司 Embedded platform identity authentication trusted network connection method and system
DE112018000705T5 (en) 2017-03-06 2019-11-14 Cummins Filtration Ip, Inc. DETECTION OF REAL FILTERS WITH A FILTER MONITORING SYSTEM
CN109587152A (en) * 2018-12-14 2019-04-05 济南浪潮高新科技投资发展有限公司 A kind of method and system based on encoding and decoding encrypted media gateway
CN112887286B (en) * 2021-01-15 2021-11-19 西安电子科技大学 Lightweight RFID identity authentication method and system based on cloud server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070206786A1 (en) * 2005-08-31 2007-09-06 Skyetek, Inc. Rfid security system

Also Published As

Publication number Publication date
WO2012067487A1 (en) 2012-05-24

Similar Documents

Publication Publication Date Title
GB2474200A (en) Ticket authorized secure installation and boot
WO2014208033A3 (en) Secure discovery for proximity based service communication
WO2013066513A3 (en) Systems and methods to secure user identification
MX361609B (en) Cloud and smartphone communication system and method.
FR2985343B1 (en) METHOD FOR EXECUTING AN APPLICATION IN AN NFC DEVICE
EP2273417A3 (en) Device authority for authenticating a user of an on-line service
GB201213277D0 (en) Two device authentication mechanism
EP2605175A3 (en) Method and apparatus for checking field replaceable unit, and communication device
WO2012094205A3 (en) Methods and systems for providing a signed digital certificate in real time
WO2012057509A3 (en) Method and server for the social network-based sharing of tv broadcast content, and method and device for receiving a service for the social network-based sharing of tv broadcast content
WO2012006090A3 (en) Methods, systems, and computer readable media for registering in a merchant sponsored program using a near field communication (nfc) device
GB2490824A (en) Authentication system and method in a contactless environment
MX2009010456A (en) System and method for managing delivery of internet content.
WO2015011296A3 (en) Method for processing geolocation data
WO2012024312A3 (en) Methods, systems, and computer readable media for providing an electronic advertisement to a mobile device
EP2564344A4 (en) Method and apparatus for coordinating service information across multiple server nodes
GB2472169A (en) System and method for providing a system management command
EP2586156A4 (en) Method and system for routing communications
BR112012017885A2 (en) method, apparatus, and computer readable medium
EP2779669A3 (en) Method and system for acquiring access rights to conditional access content
EP2573970A3 (en) Near field communication reader device, near field communication tag device, near field communication system and near field communication method
GB201216982D0 (en) Global terminal management using 2-factor authentification
BR112017000750A2 (en) interference management in an intermittent interference environment
MY155079A (en) A system and method for providing integrity verification in radio frequency identification (rfid)
WO2012124999A3 (en) Method for providing resources by a terminal, and method for acquiring resources by a server