WO2005101333A1 - Datenschutzgerechtes radio frequency identification (rfid)-system durch besitzerkontrollierte rfid-tag funktionalität - Google Patents
Datenschutzgerechtes radio frequency identification (rfid)-system durch besitzerkontrollierte rfid-tag funktionalität Download PDFInfo
- Publication number
- WO2005101333A1 WO2005101333A1 PCT/DE2005/000648 DE2005000648W WO2005101333A1 WO 2005101333 A1 WO2005101333 A1 WO 2005101333A1 DE 2005000648 W DE2005000648 W DE 2005000648W WO 2005101333 A1 WO2005101333 A1 WO 2005101333A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- rfid tag
- password
- tag according
- rfid
- value
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
Definitions
- RFID radio frequency identification
- the invention relates to an RFID tag according to the preamble of claim 1.
- the application concerns an extension of the functionality of so-called RFID (Radio Frequency Identification) systems.
- RFID tags and the necessary infrastructure such as
- Readers have long been known in the prior art and are used, for example, to identify objects.
- RFID tags usually have a transmitting and receiving device with which they can be used, among other things. can transmit identification (identification data) to a reader (reader) and can perform other functions (called up) instructed by the reader as soon as an RFID tag is within its scope.
- the identification serves to identify the RFID tags and thus the associated object.
- these RFID tags can replace the barcodes previously used on consumer products in order to simplify logistics processes and processes in the supermarket.
- self-service checkouts are planned because the contents of a shopping cart with RFID tags can be scanned completely in one step.
- the present invention addresses the privacy problem of this technology: Since each RFID tag should have a unique serial number, the route of every consumer product can
- RFID tags which provide such a kill function, are described in the specification version 1.0 of the EPC Global (http: // epcglobalinc. Org / standardstechnologie / specifications. Html).
- the invention solves the described privacy problem of the previous RFID technology and, in addition to the known kill function, enables further use of de.tr.
- the invention extends the functionality of the RFID tags by the possibility of dynamic activation, deactivation or restriction of the (identification) functionality of the RFID tags. Specifically, this means that an internal state is used to decide which functions an RFID tag performs and to what extent if a specific request from the reader is received. In particular, a state is provided in which the RFID tag does not output any of the internally stored data that usually enable identification.
- the RFID tag should fulfill the communication protocols valid between the reader and the RFID tag in every state to such an extent that the transmission and reception of data and commands is possible.
- an RFID tag must signal its presence to a reader and participate in a so-called singulation or anti-collusion protocol in order to be able to receive individual commands at all.
- An anti-collusion protocol is presented in the above EPC Global Specifications, which does not use the stored identifying data.
- DE 101 61 302 proposes anti-collusion protocols that are based on regularly newly generated random values instead of on identifying data.
- An advantageous embodiment of the RFID tag provides a function for changing the internal state. This function is only carried out after the reading device calling the function has proven knowledge of a secret data record, a bit sequence stored on the RFID tag.
- the secret record is referred to below as a password.
- the verification function is referred to below as verification.
- Another embodiment of the RFID tag provides a rewritable, non-volatile memory space for storing the password.
- the first password can advantageously be set during the manufacturing process of the RFID tag or when the product is connected to the RFID tag. Ideally, the password should be registered together with the identification data, since both should be sent with the Produl-ct in every step of the logistics chain.
- the password is sent from the reader to the RFID tag for verification.
- the advantage of this method of verification is that it is very easy to implement on the RFID tag. Only a comparison function of the saved password with the received password is required.
- the disadvantage is that the password can be determined by other devices by listening to the radio communication.
- a means (also referred to here as a "function") is available both in the RFID tag and in the reader, which combines the passwoxt and another value to form a test value.
- a randomization means is generated in the RFID tag The value (ie the choice of algorithm) of the randomizing agent for generating the
- Random value is basically any.
- a noise source with a Sa p Hing circuit eg a diode
- a hash function can be repeatedly applied to an initial value individually assigned during production and the random sequence can be formed from parts of the respective intermediate texts.
- the means for calculating the test value can be implemented as desired become.
- a cryptographically secure one-way function or a symmetrical one would be ideal
- Encryption function one of the input values being used as a key, since it is difficult or impossible to reverse the function or to determine an unknown third value if the other two are known.
- the implementation options of the test value mean also include the possibility of carrying out the calculation only on the basis of an input value, whereby either only the internal password is used or any other means is used to combine the input values.
- the implementation options of the test value mean also include the possibility of performing the calculation on the basis of more than two input values.
- the implementation options of the test value mean also include the possibility of calculating more than one output value.
- the RFID tag first generates a random value and stores it in one
- the Memory and also sends the random value to the reader.
- the reader uses the test value mean, the password and the received random value being used as input.
- the reader sends the test value to the RFID tag.
- the RFID tag calculates a second test based on the saved password and the stored random value and compares the two test values. If both test values match, the function protected by the verification is executed.
- the means on the RFID tag can also reverse the calculation, that is, calculate the other from the test value and an input value and compare them.
- the advantage of the second version of the verification is the security against eavesdropping, the disadvantage is the higher circuit complexity of the RFID tag.
- the security of the procedure i.e. the protection against the
- the ability of the password to be determined by a third party depends on the cryptographic quality of the test value means (i.e. how difficult it is to reverse the one-way function or determine the unknown value), the cryptographic quality of the random number generator and the length of the bit sequences used for the password, random value and test value ,
- an embodiment of the RFID tag according to the invention provides a means (a function) for changing the password. This function is only carried out after successful verification of the previous password. The new password is transferred from the reader to the RFID tag.
- the new password is sent from the reader to the RFID tag.
- the advantage of this embodiment of the invention is that it can be easily implemented on the RFID tag.
- the disadvantage is the possibility of eavesdropping by another device.
- a means is available both in the RFID tag and in the reader, which can calculate a third from two input values.
- This means can be implemented as desired, whereby the calculation must be reversible to the extent that there is a means which can calculate the second input value from one of the input values and the output value.
- An example of such means are any symmetrical encryption functions or the bitwise XOR overlay of the two input values.
- the implementation options of the funds also include the possibility of calculating on the basis of more than two Perform input values.
- the realization options of the funds also include the possibility of calculating more than one output value.
- the advantage of this embodiment of the invention is the higher security against eavesdropping, the disadvantage is the higher circuit complexity of the RFID tag.
- the security of the method depends on the cryptographic quality of the means used and on the length of the values used, the simple bitwise XOR overlay (one-time pad) already offering maximum security and thus being optimal.
- the password is e.g. handed over to the customer at or after the supermarket checkout (e.g. by printing on the receipt).
- the invention also relates to an advantageous method for changing the passwords, which solves the problem that RFID
- the advantageous method includes that an owner stores the same password for all RFID tags in his possession. Only then or in the process Deactivation. Ideally, this procedure should already be carried out at the supermarket checkout, for example.
- the change of owner of an RFID tag for example at the cash register of one
- the previous owner changes the password of the RFID tags to be transferred to a randomly selected value.
- the old owner informs the new owner of the password used.
- the new owner carries out a second password change outside of the radio range (in his trust area), the owner usually using a common password for all of his RFID tags.
- the password change should be repeated by a reader in the person's area of trust.
- step 1 is carried out only once and the password stored once in the device is used for all RFID tags.
- step 2 is carried out only once and the password stored once in the device is used for all RFID tags.
- step 3 is carried out only once and the password stored once in the device is used for all RFID tags.
- step 6 is available to the user through step 6 previous
- Step 6 Password change is available and may have to be transmitted to the reader. Step 6 is omitted.
- the third option could be particularly important in a start-up phase of the technology if only a few customers have intelligent household appliances. You could, so to speak, migrate important RFID tags afterwards if such a device was purchased. On the other hand, shopping is also possible without the electronic device that stores the passwords.
- the change of ownership takes place only by handing over the previous one Password.
- This option may be practical at the supermarket checkout, as the RFID tags are assigned an individual password during manufacture. However, this procedure is not recommended for transfer from one trust area to another, since in this case the new owner would have to be informed of the common password of all RFID tags of the previous owner.
- RFID tags can be used in such a way that they issue an EPC (Electronic Product Code), which consists of a product identifier and a serial number of the individual object. In this version, only the product identifier would be output. Which specific object of the product is available remains hidden.
- EPC Electronic Product Code
- the output of the Identification number is limited to verified reading devices, but any other information that can be changed by a verified reading device in an embodiment of the invention, which can be called up via additional functions, is generally provided. This makes it possible, for example, to make recycling information about the chemical components legible or for information for packaging machines that require deposit.
- a further advantageous embodiment of the invention is seen. Average before which a test value is calculated from two input values. Examples of the implementation of such a means are a cryptographic hash function (one-way function) or a symmetrical one
- Encryption function With the help of a challenge-response procedure and with the participation of the RFID tag or product manufacturer, the authenticity of the RFID tag and thus, with restrictions, the authenticity of the product can be checked.
- the background to the development of the invention is the fact that it is possible to produce freely programmable RFID tags without any problems - for production-related reasons, almost all RFID tags may even be produced without a specific identification number and instead they only receive the first and final programming on the product. RFID tags without a verifiable identification number will therefore make product counterfeiting easier rather than more difficult.
- another secret value must be stored in the RFID tag according to the invention, which can be stored in a non-rewritable memory.
- a means must be provided in the computer system of the product or RFID tag manufacturer that the Repeat or reverse calculation of the mean in the RFID tag.
- the reader generally requires an online connection to the manufacturer's computer system.
- the manufacturer also needs a database that stores at least the identification number and the secret value stored in the RFID tag for each RFID tag.
- the reader sends the RFID tag a random value.
- the RFID tag calculates the test value with the aid of which the
- Random value and the secret value stored in the RFID tag can be used as input.
- the test value is sent back to the reader.
- the reader sends the combination of RFID tag identification data, random value and test value to the manufacturer.
- the manufacturer checks the correctness using his means and the secret value stored in his database for the requested RFID tag. Depending on the form of the mean, two of the three values (random value, test value and secret value of the RFID tag) are used as input values and the result with the third
- the reading device already receives one or more valid combination of random value and test value for a specific RFID tag in advance.
- the authenticity of the RFID tag can then be checked locally without an online connection being necessary, in that the random value obtained in the combination is sent to the RFID tag and the response of the
- RFID tags are compared with the test value.
- Verification function sending the password or Carrying out the Challenge Response procedure and the corresponding means for proving knowledge of the password • Calling up the function after verification of the password • Function for changing the state • Function for changing the password • Method to save the shared password and only pass it on to other devices that are known to be trusted • Method to take possession of new RFID tags by specifying the respective passwords by changing the passwords to the common password.
- FIG. 1 shows a schematic representation of the data flow in a first embodiment of the RFID tag according to the invention in cooperation with a reading device
- FIG. 2 shows a schematic representation of the data flow in a second embodiment of the RFID tag according to the invention with secure password verification
- the RFID tag 1 shows a first embodiment in which a simple embodiment of the RFID tag according to the invention is shown.
- the RFID tag 1 has a memory 5 which has a unique identifier for the tag itself. This makes it clearly distinguishable from all other tags.
- the RFID tag 1 has a memory 6 for an internal password.
- RFID tag 1 has a memory 7 for the internal state, which indicates whether certain functions can be carried out or not.
- the RFID tag 1 interacts with a reader 2 during operation.
- the RFID tag 1 and the reading device (2) each have a transmitting device 3, 3 'and a receiving device 4, 4' for data, which can be quite different in design.
- the reader 2 sends a request for identification to the RFID tag 1.
- a password can be specified.
- the internal state of the RFID tag 1 is checked in the second comparison means 9 in FIG. 1. It is either “open” or “locked” and stored as a flag in memory 7.
- the unique identification of the memory 5 is only output to authorized readers 2, which prove knowledge of the internal password stored in memory 6.
- the internal password is compared with a password (reader password 6 ′) that may have been read in by the reader. If no password has been read in by the reader 2 or the passwords do not match, the method terminates with the final state 8. An error message is optionally output.
- a branching device 11 is used to decide whether:
- the unique identifier is output from memory 5
- each value stored in an RFID tag 1 that is able to uniquely identify the object - that is, which is different in each object - represents a unique identifier 5 for the RFID tag 1.
- the order of the comparisons according to claims 9 to 11 can be carried out in any order.
- the status check can be omitted for all inquiries except for labeling.
- Lock state (as a function call) must be protected.
- FIG. 2 shows the RFID tag 1 with all functions shown in FIG. 1, so that reference can be made to the above description.
- password verification takes place in a particularly secure manner. This is done in two steps: a) First the function is called,
- modified processing takes place here in the second comparison means 9. If the internal state (see memory 7) is blocked, then a random value generator 12 is addressed which generates a random value. This is stored in a buffer 13.
- This random value is then sent to the reading device 2 via the transmitting device 3.
- this random value is processed together with the internal password from memory 6 by a test value means 14.
- the test value means 14 calculates a unique test value from these data.
- the reader 2 basically has the same information, namely a reader password 6 'and the received random value. With a structurally identical test value means 14 ', a test value is likewise determined in the reading device 2 and transmitted to the RFID tag 1.
- the first comparison means 10 a comparison is carried out between the test value generated by the RFID tag 1 and the test value generated by the reading device 2.
- a means 15 for changing the internal password is also provided in the memory 6. This generates a new internal password, from the previous internal password and a value received from reader 2. In this case, the branching means 11 issues a corresponding instruction.
- FIG. 3 shows the sequence of an embodiment of the method according to FIG. 1 or 2.
- a request for the unique identification and a subsequent password change (for ownership (s) transfer) and a subsequent blocking of the internal state of the RFID tag are described.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05744012.5A EP1735760B1 (de) | 2004-04-13 | 2005-04-13 | Datenschutzgerechtes radio frequency identification (rfid)-system durch besitzerkontrollierte rfid-tag funktionalität |
DE112005000761T DE112005000761A5 (de) | 2004-04-13 | 2005-04-13 | Datenschutzgerechtes Radio Frequency Identification (RFID)-System durch besitzerkontrollierte RFID-Tag Funktionalität |
US11/580,689 US7786866B2 (en) | 2005-04-13 | 2006-10-13 | Radio frequency identification (RFID) system that meets data protection requirements through owner-controlled RFID tag functionality |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102004018367.8 | 2004-04-13 | ||
DE102004018367A DE102004018367A1 (de) | 2004-04-13 | 2004-04-13 | Datenschutzgerechtes Radio Frequency Identification (RFID)-System durch Besitzer-kontrollierte RFID-Tag Funktionalität |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/576,871 A-371-Of-International US20140099364A2 (en) | 2004-10-08 | 2005-10-07 | Controlled release pharmaceutical compositions comprising a fumaric acid ester |
US11/580,689 Continuation US7786866B2 (en) | 2005-04-13 | 2006-10-13 | Radio frequency identification (RFID) system that meets data protection requirements through owner-controlled RFID tag functionality |
US14/209,480 Continuation US20170112793A2 (en) | 2004-10-08 | 2014-03-13 | Controlled release pharmaceutical compositions comprising a fumaric acid ester |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005101333A1 true WO2005101333A1 (de) | 2005-10-27 |
Family
ID=34970125
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/DE2005/000648 WO2005101333A1 (de) | 2004-04-13 | 2005-04-13 | Datenschutzgerechtes radio frequency identification (rfid)-system durch besitzerkontrollierte rfid-tag funktionalität |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1735760B1 (de) |
CN (1) | CN100501779C (de) |
DE (2) | DE102004018367A1 (de) |
WO (1) | WO2005101333A1 (de) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007007309A1 (de) * | 2007-02-07 | 2008-08-14 | Atmel Germany Gmbh | Verfahren zum wenigstens temporären Freischalten einer bidirektionalen Kommunikation und Transponder |
EP2474936A1 (de) * | 2009-03-04 | 2012-07-11 | Shenzhen Joinl Technology Co., Ltd | Digitales identifizierungsgerät für produktkennung, prüfgerät, produkt und verfahren für produktüberprüfung und fälschungsschutz |
CN101290653B (zh) * | 2007-04-18 | 2012-08-29 | 株式会社半导体能源研究所 | 无线通讯方法 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102008018365B4 (de) * | 2008-04-11 | 2010-05-12 | Siemens Aktiengesellschaft | Verfahren zum Nachweis der Echtheit eines RFID-Transponders |
WO2015143709A1 (zh) * | 2014-03-28 | 2015-10-01 | 华为技术有限公司 | 一种接入网络的方法、rfid标签、电子设备以及控制系统 |
CN109660985A (zh) * | 2018-12-11 | 2019-04-19 | 深圳市联智物联网科技有限公司 | 一种安全盘点无线终端的方法 |
CN109446865A (zh) * | 2018-12-11 | 2019-03-08 | 深圳市联智物联网科技有限公司 | 一种实现安全盘点无线终端的系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5640002A (en) * | 1995-08-15 | 1997-06-17 | Ruppert; Jonathan Paul | Portable RF ID tag and barcode reader |
US6104281A (en) * | 1996-07-29 | 2000-08-15 | Intermec Ip, Corp. | Radio frequency identification transponder with electronic circuit enabling/disabling capability |
US20020135478A1 (en) * | 1999-12-07 | 2002-09-26 | Peter Stegmaier | Method for operating a transponder |
US20040054900A1 (en) * | 2002-09-12 | 2004-03-18 | Duanfeng He | System and method for encrypted communications between electronic devices |
US20040066278A1 (en) * | 2002-10-04 | 2004-04-08 | Hughes Michael A. | Challenged-based tag authentication medel |
-
2004
- 2004-04-13 DE DE102004018367A patent/DE102004018367A1/de not_active Withdrawn
-
2005
- 2005-04-13 CN CNB2005800194171A patent/CN100501779C/zh active Active
- 2005-04-13 DE DE112005000761T patent/DE112005000761A5/de not_active Withdrawn
- 2005-04-13 EP EP05744012.5A patent/EP1735760B1/de active Active
- 2005-04-13 WO PCT/DE2005/000648 patent/WO2005101333A1/de active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5640002A (en) * | 1995-08-15 | 1997-06-17 | Ruppert; Jonathan Paul | Portable RF ID tag and barcode reader |
US6104281A (en) * | 1996-07-29 | 2000-08-15 | Intermec Ip, Corp. | Radio frequency identification transponder with electronic circuit enabling/disabling capability |
US20020135478A1 (en) * | 1999-12-07 | 2002-09-26 | Peter Stegmaier | Method for operating a transponder |
US20040054900A1 (en) * | 2002-09-12 | 2004-03-18 | Duanfeng He | System and method for encrypted communications between electronic devices |
US20040066278A1 (en) * | 2002-10-04 | 2004-04-08 | Hughes Michael A. | Challenged-based tag authentication medel |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007007309A1 (de) * | 2007-02-07 | 2008-08-14 | Atmel Germany Gmbh | Verfahren zum wenigstens temporären Freischalten einer bidirektionalen Kommunikation und Transponder |
US8183983B2 (en) | 2007-02-07 | 2012-05-22 | Atmel Corporation | Method for the at least temporary activation of bidirectional communication and transponder |
CN101290653B (zh) * | 2007-04-18 | 2012-08-29 | 株式会社半导体能源研究所 | 无线通讯方法 |
EP2474936A1 (de) * | 2009-03-04 | 2012-07-11 | Shenzhen Joinl Technology Co., Ltd | Digitales identifizierungsgerät für produktkennung, prüfgerät, produkt und verfahren für produktüberprüfung und fälschungsschutz |
EP2474936A4 (de) * | 2009-03-04 | 2013-01-02 | Shenzhen Joinl Technology Co Ltd | Digitales identifizierungsgerät für produktkennung, prüfgerät, produkt und verfahren für produktüberprüfung und fälschungsschutz |
Also Published As
Publication number | Publication date |
---|---|
EP1735760B1 (de) | 2017-11-15 |
CN1998029A (zh) | 2007-07-11 |
EP1735760A1 (de) | 2006-12-27 |
DE112005000761A5 (de) | 2007-05-24 |
DE102004018367A1 (de) | 2005-11-10 |
CN100501779C (zh) | 2009-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE102005032473B4 (de) | Verfahren zur Zugriffssteuerung auf einen Transponder | |
DE102006030767B4 (de) | Verfahren, Transponder und System zum sicheren Datenaustausch | |
DE60221700T2 (de) | Systeme zum sicheren markieren von daten | |
EP1735760B1 (de) | Datenschutzgerechtes radio frequency identification (rfid)-system durch besitzerkontrollierte rfid-tag funktionalität | |
WO2008116647A1 (de) | Transponder mit zugriffsschutz und verfahren zum zugriff auf den transponder | |
DE60317735T2 (de) | Authentifizierung eines elektronischen Etiketts | |
EP1587001A1 (de) | Sicherheitseinrichtung für einen Transponder | |
EP2156602B1 (de) | Verfahren und system zur prüfung der echtheit eines produkts und lesegerät | |
EP1876751A2 (de) | Transponder, RFID-System und Verfahren für RFID-System mit Schlüsselverwaltung | |
DE102006032129A1 (de) | Skalierbares Verfahren zur Zugriffssteuerung | |
DE102008023914A1 (de) | Verfahren zur Authentifizierung eines RFID-Tags | |
EP2203863A1 (de) | Verfahren zum schutz mindestens von teilen von auf mindestens einem server und/oder in mindestens einer datenbank abgelegten, einem durch ein rfid-tag identifizierten produkt zugeordnete produktdaten vor unberechtigtem zugriff | |
DE112006002844T5 (de) | Verbessertes Sicherheitsprotokoll für Funkfrequenzsysteme | |
DE102004061452A1 (de) | Mehrfaches RFID-Antikollisions-Abfrageverfahren | |
EP1236171B1 (de) | Verfahren zum betreiben eines transponders | |
EP1459155B1 (de) | Verfahren und system zum ermitteln einer einem objekt zugeordneten information | |
EP2340501B1 (de) | Verfahren zur challenge-response-authentisierung zwischen einem lesegerät und einem transponder basierend auf einer kontaktlosen datenübertagung | |
WO2006008223A1 (de) | Verfahren, mit welchem ein endgerät informationen, die mit einem epc-code assoziiert werden, aus einem epc-netzwerk holen kann | |
EP2827269B1 (de) | Verfahren zum Authentifizieren eines RFID-Tags | |
EP2590357A1 (de) | Verfahren und System zur Identifizierung eines RFID-Tags durch ein Lesegerät | |
EP1571591B1 (de) | Verwendung eines RFID-Tags um mit einem Mobilgerät auf eine Hypertext-Seite zuzugreifen | |
WO2008095664A2 (de) | Verfahren zum wenigstens temporären freischalten einer bidirektionalen kommunikation und transponder | |
DE102007061825A1 (de) | Elektronisches Etikett zur Produktsicherung | |
DE102006049375A1 (de) | RFID-Chip mit Koordinationsfunktion | |
DE69928914T2 (de) | Elektronisches Identifizierungssystem und -verfahren mit Ursprungsechtheit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REEP | Request for entry into the european phase |
Ref document number: 2005744012 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005744012 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1120050007618 Country of ref document: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11580689 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580019417.1 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2005744012 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 11580689 Country of ref document: US |
|
REF | Corresponds to |
Ref document number: 112005000761 Country of ref document: DE Date of ref document: 20070524 Kind code of ref document: P |