发明名称 Authentication of an RFID tag using an asymmetric cryptography method
摘要 A method for the authentication of an RFID tag uses an asymmetric cryptography method which ensures protection against the recycling of authentication RFID tags and needs no deactivation of the corresponding RFID tag for this purpose. To this end, the certificate of an RFID tag to be checked is not stored on the RFID tag but is stored physically separately from the RFID tag. Firstly, the RFID reader reads the certificate of the RFID tag to be checked before the challenge-response protocol is carried out successfully with the RFID tag to be checked. Consequently, an RFID tag can be reused for authentication only when the certificate relating to this RFID tag is known.
申请公布号 US8842831(B2) 申请公布日期 2014.09.23
申请号 US201013322622 申请日期 2010.03.23
申请人 Siemens Aktiengesellschaft 发明人 Braun Michael
分类号 H04K1/00;H04L9/32;G06F21/44 主分类号 H04K1/00
代理机构 King & Spalding L.L.P. 代理人 King & Spalding L.L.P.
主权项 1. A method for authentication of an RFID (Radio Frequency Identification) tag by an RFID reader using a challenge-response protocol in accordance with an asymmetric cryptography method, the method comprising: assigning to the RFID tag a pair of keys with a private key and at least one first public key, assigning to the key pair a digital signature for authentication of the first public key, wherein the private key is stored on the RFID tag, and wherein the first public key and the digital signature are stored in memory physically separated from the RFID tag, but not stored on the RFID tag, and are automatically detectable by a data capture device, the RFID reader device authenticating the RFID tag by a process including: the RFID reader accessing the first public key and the digital signature from the memory physically separated from the RFID tag, such that the first public key and the digital signature remain separate from the RFID tag,the RFID reader checking the validity of the first public key based on the digital signature accessed from the memory physically separated from the RFID tag and a second public key of a key issuer known by the RFID reader,the RFID reader generating and wirelessly transferring a challenge to the RFID tag,the RFID reader receiving from the RFID tag a response to the transferred challenge, the response based on the transferred challenge and the private key, andthe RFID reader authenticating the RFID tag based on the transferred response received from the RFID tag and the public key authenticated using the digital signature accessed from the memory physically separated from the RFID tag.
地址 Munich DE