Proxy device for enhanced privacy in an RFID system

Communications: electrical – Selective – Interrogation response

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C340S010100

Reexamination Certificate

active

07920050

ABSTRACT:
A proxy device is disclosed for use in an RFID system comprising a plurality of RFID devices and at least one reader which communicates with the proxy device and one or more of the RFID devices. The proxy device acquires information characterizing at least a given one of the RFID devices, controls the given RFID device so as to at least partially prevent the given RFID device from being read by the reader, and communicates with the reader in a manner which simulates the given RFID device. This advantageously allows the proxy device to implement privacy policies of arbitrary sophistication on behalf of the given RFID device. The proxy device subsequently releases control of the given RFID device so as to permit the given RFID device to again be read by the reader.

REFERENCES:
patent: 6061344 (2000-05-01), Wood, Jr.
patent: 6847892 (2005-01-01), Zhou et al.
patent: 7113594 (2006-09-01), Boneh et al.
patent: 7221900 (2007-05-01), Reade et al.
patent: 2001/0041551 (2001-11-01), Rotzoll
patent: 2002/0063622 (2002-05-01), Armstrong et al.
patent: 2002/0080944 (2002-06-01), Bedingfield et al.
patent: 2002/0184200 (2002-12-01), Ueda et al.
patent: 2003/0105725 (2003-06-01), Hoffman
patent: 2004/0002305 (2004-01-01), Byman-Kivivuori et al.
patent: 2004/0025032 (2004-02-01), Chow et al.
patent: 2004/0066278 (2004-04-01), Hughes et al.
patent: 2004/0100359 (2004-05-01), Reade et al.
patent: 2004/0160324 (2004-08-01), Stilp
patent: 2004/0222878 (2004-11-01), Juels
patent: 2004/0223481 (2004-11-01), Juels et al.
patent: 2005/0099268 (2005-05-01), Juels et al.
S.E. Sarma et al., “Radio-Frequency Identification: Security Risks and Challenges,” RSA Laboratories, CryptoBytes, vol. 6, No. 1, pp. 1-32, Spring 2003.
S.A. Weis et al., “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Proceedings of the First International Conference on Security in Pervasive Computing, 12 pages, 2003.
A. Juels, “Yoking-Proofs' for RFID Tags,” PerCom Workshops, IEEE Computer Society, pp. 138-143, 2004.
“EPC™ Radio-Frequency Identity Protocols Class-1 Generation 2 UHF RFID Protocol for Communications at 860 MHz—960 MHz,” Version 1.0.8., pp. 1-93, 2005.
J. Stern et al., “Cryptanalysis of the OTM Signature Scheme from FC'02,” Financial Cryptography '03, pp. 138-148, Springer-Verlag, LNCS No. 2742, 2003.
A. Juels, “Minimalist Cryptography for Low-Cost RFID Tags,” Security in Communication Networks, (SCN 04), pp. 149-164, Springer-Verlag, LNCS No. 3352, 2004.
“23 mm Glass Transponder,” Radio Frequency Identification Systems, Texas Instruments, 1 page, Dec. 2001.
“12 mm Wedge Transponder,” Radio Frequency Identification Systems, Texas Instruments, 1 page, Dec. 2001.
M. Jakobsson et al., “Security Weaknesses in Bluetooth,” 16 pages, 2001.
“Read/Write Transponder,” Atmel, 22 pages, Apr. 2003.
S.A. Weis, “Security and Privacy in Radio-Frequency Identification Devices,” Master of Science Thesis, MIT, pp. 1-79, May 2003.
A. Juels et al., “Squealing Euros: Privacy Protection in RFID-Enabled Banknotes,” Financial Cryptography, Springer-Verlag, 18 pages, 2003.
P. Golle et al., “Universal Re-encryption of Mixnets,” Springer-Verlag , 14 pages, 2002.
D.L. Brock, “The Electronic Product Code (EPC): A Naming Scheme for Physical Objects,” White Paper, MIT-AUTOID-WH-002, MIT Auto-ID Center, http://www.autoidcenter.org., pp. 1-21, Jan. 2001.
Auto-ID Center, Technical Report, “13.56 MHz ISM Band Class 1 Radio Frequency Identification Tag Interface Specification: Recommended Standard, Version 1.0.0,” MIT-AUTOID-TR-011, MIT Auto-ID Center, http://autoidcenter.org, pp. 1-31, Feb. 2003.
S. Garfinkel, “An RFID Bill of Rights,” Technology Review, p. 35, Oct. 2002.
S.E. Sarma et al., “RFID Systems, Security & Privacy Implications,” White Paper, MIT-AUTOID-WH-014, MIT Auto-ID Center, pp. 1-16, Nov. 2002.
D.W. Engels, “HF Identity Tag Action Group: Scope and Deliverables,” Technical Report, MIT-AUTOID-TR-020, MIT Auto-ID Center, pp. 1-5, Jul. 2003.
S.E. Sarma, “Towards the 5¢ Tag,” White Paper, Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, pp. 1-19, Nov. 2001.
R. Agrawal et al., “Privacy-Preserving Data Mining,” Proc. of the ACM SIGMOD Conference on Management of Data, ACM Press, 12 pages, 2000.
D. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communications of the ACM, vol. 24, No. 2, 9 pages, Feb. 1981.
M. Mealling, “Auto-ID Object Name Service (ONS) 1.0,” Auto-ID Working Draft, 17 pages, Aug. 2003.
M.G. Reed et al., “Protocols Using Anonymous Connections: Mobile Applications,” In Security Protocols, Proceedings of the 5th International Workshop, Springer-Verlag LNCS 1361, 11 pages, 1997.
S. Clark et al., “Auto-ID Savant Specification 1.0,” Auto-ID Center, pp. 1-59, Sep. 2003.
K.P. Fishkin et al., “Some Methods for Privacy in RFID Communication,” 1st European Workshop on Security in Ad-Hoc and Sensor Networks, ESAS, pp. 1-13, 2004.
A. Juels et al.,“The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy,” 8th ACM Conference on Computer and Communications Security, ACM Press, 16 pages, 2003.
Auto-ID Center, Technical Report, “860 MHz-960MHz Class 1 Radio Frequency Identification Tag Radio Frequency & Logical Communication Interface Specification: Recommended Standard, Version 1.0.0,” MIT-AUTOID-TR-007, MIT Auto-ID Center, pp. 1-17, Nov. 2002.
D. McCullagh, “RFID Tags: Big Brother in Small Packages,” CNET, www.news.com, 3 pages, Jan. 2003.
G. Romen, “Nokia Unveils RFID Phone Reader,” RFID Journal, 2 pages, Mar. 17, 2004.
F. Stajano et al., “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks,” 7th International Workshop Proceedings, pp. 1-11, 1999.
J. Stanley, “Chip Away at Privacy: Library Tracking System Spawns Big Brother Ire,” San Francisco Chronicle, 1 page, Jul. 2, 2004.
R. Stapleton-Gray, Ph.D., “Would Macy's Scan Gimbels? Competitive Intelligence and RFID,” Technical Report, www.stapleton-gray.com, pp. 1-7, 2003.
K. Takaragi et al., “An Ultra Small Individual Recognition Security Chip,” IEEE, vol. 21, Issue 6, pp. 43-49, 2001.
R. Tuchinda, “Security and Privacy in the Intelligent Room,” Master's Thesis, M.I.T., pp. 1-74, May 15, 2002.
“RFID, Privacy, and Corporate Data,” RFID Journal, www.rfidjournal.com, 5 pages, Jun. 2, 2003.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Proxy device for enhanced privacy in an RFID system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Proxy device for enhanced privacy in an RFID system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Proxy device for enhanced privacy in an RFID system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2660157

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.