发明名称 Authenticated radio frequency identification and key distribution system therefor
摘要 An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such as RSA. Either ECDSA or ECPVS can be used to reduce the signature size and ECPVS can be used to hide a portion of the RFID tag that contains sensitive product identifying information. As a result, smaller tags can be used or multiple signatures can be written at different stages in a manufacturing or supply chain. A key management system is used to distribute the verification keys and aggregate signature schemes are also provided for adding multiple signatures to the RFID tags, for example in a supply chain.
申请公布号 US9013266(B2) 申请公布日期 2015.04.21
申请号 US200711898181 申请日期 2007.09.10
申请人 Certicom Corp. 发明人 Griffiths-Harvey Michael;Neill Brian;Smith Keelan;Rosati Tony;Davis Walt
分类号 G05B19/00;H04L9/30;H04L9/32 主分类号 G05B19/00
代理机构 Fleit Gibbons Gutman Bongini & Bianco P.L. 代理人 Fleit Gibbons Gutman Bongini & Bianco P.L.
主权项 1. A method for managing verification keys for RFID readers, said method comprising: receiving, from a signer, a request for a new verification key; returning, to said signer, a response associated with the new verification key; updating permissions for RFID readers for using said new verification key; obtaining the new verification key corresponding to a private key of the signer, said private key being used to generate a signature stored in memory on an RFID tag read by at least one of said RFID readers, said signature comprising: (i) a first signature component generated by encrypting sensitive data comprising a product type using an encryption key, said product type identifying a product to which the RFID tag is attached, said first signature component being stored in a first portion of said memory and hiding said product type from RFID readers not having said new verification key, said sensitive data being recoverable from said first signature component using a decryption key generated using said new verification key; (ii) a second signature component generated using said first signature component, said private key of said signer, and visible data, said second signature component being stored in a second portion of said memory and being used to generate said decryption key, and (iii) said visible data stored in plaintext in a third portion of said memory; and distributing said new verification key to an RFID reader using a controlled channel, after determining that said RFID reader has permission to recover said sensitive data from said first signature component when verifying said signature.
地址 Mississauga, Ontario CA