G06K7/10257

Tag-handle-based authentication of RFID readers

An RFID tag may execute instructions from an authenticated RFID reader. A tag determines a handle and a first parameter, both of which may be random numbers, and sends the handle to a reader. Upon receiving a challenge from the reader, the tag determines and sends a cryptographic response to the challenge based on an algorithm, a tag key, the first parameter, and the challenge. Upon receiving a message with a second parameter and a tag instruction, the tag executes the tag instruction upon verifying that the second parameter derives from the first parameter and the tag handle.

Mobile application-based error response

An apparatus is configured to receive a data feed. The data feed includes location data of a first card reader that may be compromised and an identifier of the party that initiated the alert. The apparatus is further configured to determine that the location data of the first card reader matches a location identifier associated with a first card reader owner profile. The apparatus is also configured to determine that the owner of the card reader is not the entity receiving the alert. The apparatus then determines that there is not a match between the identifier of the party that initiated the alert and a user identifier from a plurality of user account profiles. The apparatus is further configured to transmit a message to the card reader owner indicating that the card reader may be compromised.

Tag-to-tag communication using RFID readers
09740891 · 2017-08-22 · ·

Messages may be passed between Radio Frequency Identification (RFID) tags using RFID readers. A first tag with a message intended for a second tag sends the message to an RFID reader. The reader then determines that the destination of the message is the second tag and sends the message to the second tag. The second tag may confirm receipt of the message by sending a receipt confirmation message to the reader for forwarding to the first tag, and/or the reader may itself confirm that the message was sent to the second tag by sending a transmit confirmation message to the first tag.

Method for preventing unauthorized diversion of NFC tags

A method, system and apparatus for pairing authorized NFC enabled RFID devices with an intended object or product. The method, system and apparatus can include a primary RFID with a radio frequency identification chip, a coil antenna, a bridge and a substrate; an association of the at least primary RFID device with an object; an integration of a material into one of the at least primary RFID device and the object that provides the RFID device with a predetermined resonant frequency; and the detuning of one or more secondary communication devices located proximate the RFID device.

Tamper credential

Readers are associated with a number of access credentials and, once authenticated by the reader, may grant the holder of the access credential access to a secured asset. Readers may become the target of attack, such as when an unauthorized party attempts to gain access to the interior of the reader or removes the reader from an installed location. Once removed the reader may be reinstalled in another location or a counterfeit reader used in its place. By providing a paired tamper credential, the reader may deny otherwise authorized access to the secured asset if the tamper credential fails to respond appropriately. The tamper credential may fail to respond due to distance, such as when the reader alone is relocated, or the tamper credential is damaged, such as during an attempt to gain access the interior of the reader and/or remove the reader from its installed location.

METHODS AND APPARATUSES FOR DETERRING UNAUTHORIZED RFID SCANNERS
20220309258 · 2022-09-29 ·

Aspects of the present disclosure include receiving one or more RFID interrogating signals from the RFID scanner, generating one or more internal signals, mixing the one or more RFID interrogating signals with the one or more internal signals to generate one or more resultant signals, and backscattering the one or more resultant signals.

RFID tag and reader characteristic determination using group keys
09773133 · 2017-09-26 · ·

An RFID tag possesses a group key issued by an authorized entity. When a reader requests some information from the tag, such as an identifier, the tag transmits a random number to the reader. The tag then determines one or more reader characteristics based on a response received from the reader. In one embodiment, the tag generates a verification value based on the random number and the group key and compares the verification value to the received response. If the comparison succeeds, the tag may treat the reader as possessing particular functionality, authorized to implement a particular feature, and/or authorized to receive information from the tag. If the comparison fails, the tag may treat the reader as lacking particular functionality, not authorized to implement a particular feature, and/or not authorized to receive information from the tag. The tag may request additional response(s) from the reader before determining the reader characteristic(s).

Chip card arrangement, chip card, apparatus for contactless interaction with a chip card arrangement or a chip card, and method for operating and method for producing a chip card arrangement or chip card
09811695 · 2017-11-07 · ·

In various embodiments, a chip card arrangement for carrying out contactless interaction with an external apparatus is provided. The chip card arrangement may include: a chip card, which has an electronic circuit, and having an optical coding element, which can be used to present an optically capturable code, wherein the electronic circuit is designed such that the interaction requires at least the code.

Secure RFID communication method
11398898 · 2022-07-26 · ·

A secure communication method between an RFID transponder and an RFID reader. The method includes at least the following steps: the RFID reader sends a series of random numbers A1 to the RFID transponder; the RFID transponder sends a series of random numbers A2 to the RFID reader; the RFID reader sends a result R1 to the at least one RFID transponder; the RFID transponder compares the result R1 with a result R1′. If R1′ is equal to R1, then the RFID transponder switches from a locked communication mode to an unlocked communication mode, and sends a result R2′ to the at least one RFID reader.

Secure mode for electronic access control readers

An electronic reader may operate in a normal mode. The reader may evaluate criteria to determine whether to continue operating in the normal mode or operate in a secure mode. The secure mode may include deactivating functionality in the reader. Deactivating functionality may include at least one of disabling a credential reading functionality, disabling a credential processing functionality, and disabling a credential communicating functionality.