摘要 |
RFID readers, computers, and methods are provided for determining the authentication of one or more RFID tags associated with a proffered item. In some embodiments, an Item Identifier (II) is input from the tags, along with a Declared Password (DP) corresponding to the II. A question is generated about whether the DP is regarded as proper for the II by a reference database, and applied to data of the reference database. A host of the database uses special permissions, such that an answer to the question does not reveal the good password, unless the DP is already the right one. Beyond the authentication of the tag, the answer can further indicate the legitimacy of the proffered item, such as for a supply chain or at a Customs Office.
|