Method and system for verifying authenticity of an object

Communications: electrical – Condition responsive indicating system – Specific condition

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C340S572400, C340S572700, C340S572800, C340S005800, C340S005260, C340S005610, C340S010100

Reexamination Certificate

active

07602291

ABSTRACT:
A method for verifying authenticity of an object includes the steps of: enabling an electronic device to generate and transmit a request signal; in response to the request signal, enabling an RFID tag to generate a first authentication code based on a varying secret key, a second authentication code based on a unique identification code of the RFID tag and the varying secret key, and a third authentication code that is based on the unique identification code of the RFID tag and the first and second authentication codes, and to wirelessly transmit the third authentication code for reception by the electronic device; and enabling the electronic device to forward the third authentication code received from the RFID tag to an authenticating center for verification. A system, which includes the RFID tag, the electronic device, and the authenticating center, and which performs the method is also disclosed.

REFERENCES:
patent: 2002/0005774 (2002-01-01), Rudolph et al.
patent: 2003/0159036 (2003-08-01), Walmsley et al.
patent: 2005/0049979 (2005-03-01), Collins et al.
patent: 2007/0294528 (2007-12-01), Shoji et al.
patent: 2008/0106371 (2008-05-01), Tseng et al.
patent: 2 431 545 (2007-04-01), None
patent: WO 2004/088579 (2004-10-01), None
patent: WO 2005/106807 (2005-11-01), None
patent: WO 2006/030344 (2006-03-01), None
patent: WO 2007/056620 (2007-05-01), None
patent: WO 2007/068519 (2007-06-01), None
patent: WO 2007/113040 (2007-10-01), None
Damith C. Ranasinghe et al., “Security and Privacy Solutions for Low-Cost RFID Systems”, Dec. 14, 2004, Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004, Proceedings of the 2004 Melbourne Australia Dec. 14-17, 2004, Piscataway NJ USA, IEEE, pp. 337-342, XP010783788, ISBN: 978-0-7803-8894-9.
T. Staake et al., “Extending the EPC Network—the Potential of RFID in Anti-Counterfeiting”, Mar. 13, 2005, Proceedings ACM SAC, XX, XX, pp. 1607-1612, XP002397697.
Ari Juels et al., “Strengthening EPC Tags Against Cloning”, Sep. 2, 2005, WISE. Proceedings of the 2005 ACM Workshop on Wireless Security. Cologne, Germany, Sep. 2, 2005 [Proceedings of the ACM Workshop on Wireless Security], New York, NY: ACM US, pp. 67-75, XP001508054, ISBN: 978-1-59593-142-9.
Stephen A. Weis et al., “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, Lecture Notes in Computer Science, Springer Verlag, Berlin, DE, vol. 2802, Jan. 27, 2004, pp. 201-212, XP002397694, ISSN: 0302-9743.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for verifying authenticity of an object does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for verifying authenticity of an object, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for verifying authenticity of an object will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4105486

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.